• Title/Summary/Keyword: Computer architecture

Search Result 3,093, Processing Time 0.028 seconds

A Model of implementation Data Architecture for Enterprise Architecture (EA를 위한 데이터 아키텍처 구축 모델)

  • Kim, Seok-Soo;Lee, Hwa-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.9
    • /
    • pp.175-183
    • /
    • 2011
  • Data is the kernel of IT. We can apply to other architectures are refer to technology and advanced method. Data architecture is our's native that must be implement ourself. It will suggest to the best method to implement for a sound information system that likes to framework of building because data is not sensitive field of evolution and change of technology. Well implemented data architecture can be effectively management and operation. Also this is easily to implement of enterprise architecture. This paper propose a model of implementation data architecture for enterprise architecture.

A Study on the Practice for Computer Architecture Course and its Learning Performance (컴퓨터 구조 교과목의 실습과 학습 성과에 관한 연구)

  • Ro, Soonghwan;Park, Seonggyoon;Ki, Jang-Geun;Choe, Jin Kyu;Sung, Young Whee;Kim, Young-Chon;Lee, Kyou Ho;Kim, Eun Jeong
    • Journal of Engineering Education Research
    • /
    • v.16 no.3
    • /
    • pp.3-9
    • /
    • 2013
  • It is very difficult for students to understand "Computer System Architecture" written by M. Morris Mano only through theoretical education. This study has developed DigCom as a computer architecture practice kit to make it easier for students to understand computer operations. The practice kit operates in the same manner as the "simple computer" described in Computer System Architecture. The purpose of this study is to examine whether using DigCom is effective in improving learning outcomes. For the purpose, t-test and two-way ANOVA were used to determine if there is any difference in learning outcomes between the experimental group of students who used DigCom and the control group who took the course in a traditional setting without using DigCom. The main conclusions of the study are as follows: Students understand computer operations better when DigCom is used in class.

Efficient Executions of MPI Parallel Programs in Memory-Centric Computer Architecture (메모리 중심 컴퓨터 구조에서 MPI 병렬 프로그램의 효율적인 수행)

  • Lee, Je-Man;Lee, Seung-Chul;Shin, Dong-Ha
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.257-258
    • /
    • 2019
  • 본 논문에서는 "프로세서 중심 컴퓨터 구조"에서 개발된 MPI 병렬 프로그램을 수정하지 않고 "메모리 중심 컴퓨터 구조"에서 더 효율적으로 수행시키는 기술을 제안한다. 본 연구에서 제안하는 기술은 메모리 중심 컴퓨터 구조가 가지는 "빠른 대용량 공유 메모리" 특징을 이용하여 MPI 표준 라이브러리가 수행하는 네트워크 통신을 통한 느린 데이터 전달을 공유 메모리를 통한 빠른 데이터 전달로 대체하여 효율성을 얻는다. 본 연구에서 제안한 기술은 도커 가상화 기술을 사용한 분산 시스템 환경에서 MC-MPI-LIB 라이브러리 및 MC-MPI-SIM 시뮬레이터로 구현되었으며 다수의 MPI 병렬 프로그램으로 시험 수행하여 효율성이 있음을 보였다.

  • PDF

A Computer Architecture Education Framework in IT Convergence Services Era (IT융합 서비스 환경을 위한 컴퓨터 아키텍쳐 교육 프레임워크)

  • Choi, Chang Yeol;Choi, Hwang Kyu
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.1
    • /
    • pp.23-31
    • /
    • 2013
  • A rapid growth of IT convergence into different application areas draws a lot of interest in high performance platform and embedded system. Industry needs well educated computer professionals with the practical understanding on the emerging technologies and core issues of contemporary popular services. In this paper, we present an education framework for computer system architecture based on rigorous analyses of the characteristics of IT convergence services and information technology trends. The proposed framework puts emphasis on real-world and hands-on subjects related to multicore architecture, embedded system and parallel processing. We believe effective use in the development and management of computer system architecture courses encouraging both industries and students.

A Pixel Pipeline Architecture with Effective Visibility Test for 3D Graphics Accelerators (향상된 가시성 검사를 수행하는 3차원 그래픽 가속기의 픽셀 파이프라인 구조)

  • Kim, Il-San;Park, Woo-Chan;Park, Jin-Hong;Han, Tack-Don
    • Journal of Korea Game Society
    • /
    • v.7 no.3
    • /
    • pp.31-38
    • /
    • 2007
  • In this paper, we proposed an effective visibility test architecture with improving the mid-texturing architecture. The proposed architecture uses the property of fragments that the visibility of adjacent fragments is identical, and performs only a single visibility test per fragment. To compare with the mid-texturing architecture, simulation results show that the bandwidth requirements and the cell area of the depth cache in the proposed architecture are reduce by 25% and 34%, respectively, in exchange for less than 5% performance decline.

  • PDF

An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks

  • Haque, Md. Mokammel;Pathan, Al-Sakib Khan;Hong, Choong-Seon;Huh, Eui-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.5
    • /
    • pp.265-277
    • /
    • 2008
  • In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they can be utilized for such networks in some manner. The major challenge of employing a PKC-based scheme in a wireless sensor network is posed by the resource limitations of the tiny sensors. Considering this sensor feature, in this paper we propose an efficient PKC-based security architecture with relatively lower resource requirements than those of previously proposed PKC schemes for WSN. In addition, our scheme aims to provide robust security in the network. Our security architecture comprises two basic components; a key handshaking scheme based on simple, linear operations and the derivation of a decryption key by a receiver node. Our architecture enables node-to-base-station and node-to-node secure communications. Analysis and simulation results show that our proposed architecture ensures a good level of security for network communications, and can be effectively implemented with the limited computational, memory, and energy budgets of current-generation sensor nodes.

An Efficient Public Key Based Security Architecture for Wireless Sensor Networks

  • Haque, Mokammel;Pathan, Al-Sakib Khan;Hong, Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1098-1099
    • /
    • 2007
  • In this paper, we propose a public key based security architecture for Wireless Sensor Networks (WSNs). The basic architecture comprises of two schemes; a key handshaking scheme based on simple linear operations for fast computation and an identity based cryptosystem which does not require any certificate authority. Our analysis shows that, the combined scheme ensures a good level of security and is very much suitable for the energy constrained trend of wireless sensor network.

  • PDF

Visual Component Assembly and Tool Support Based on System Architecture

  • Lee, Seung-Yun;Kwon, Oh-Cheon;Shin, Gyu-Sang
    • ETRI Journal
    • /
    • v.25 no.6
    • /
    • pp.464-474
    • /
    • 2003
  • Component-based development leverages software reusability and reduces development costs. Enterprise JavaBeans (EJB) is a component model developed to reduce the complexity of software development and to facilitate reuse of components. However, EJB does not support component assembly by a plug-and-play technique due to the hard-wired composition at the code level. To cope with this problem, an architecture for EJB component assembly is defined at the abstract level and the inconsistency between the system architecture and its implementation must be eliminated at the implementation level. We propose a component-based application development tool named the COBALT assembler that supports the design and implementation of EJB component assembly by a plug-and-play technique based on the architecture style. The system architecture is first defined by the Architecture Description Language (ADL). The wrapper code and glue code are then generated for the assembly. After the consistency between the architecture and its implementation is checked, the assembled EJB components are deployed in an application server as a new composite component. We use the COBALT assembler for a shopping mall system and demonstrate that it can promote component reuse and leverage the system maintainability.

  • PDF

A Study of Educational Process of architectural Computer Graphics by Job Analysis (직무분석을 통한 건축컴퓨터그래픽전공 교과과정 연구)

  • Kim, Sang-Hyun;Park, Jong-Beak
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.1 no.1
    • /
    • pp.9-15
    • /
    • 2001
  • This research is to grasp the identify the curriculum development procedure for architectural computer graphics. In order to achieve the above purpose, this study was carried out job analysis of architectural graphic designer. Architectural Computer Graphics Curriculum is developed by tasks analysis. Each characteristics are as fellow: 1. job-related knowledges are based on architectural design parts, 2. skilled workers should be made on the base of job analysis and O.J.T(On the job training) 3. trained students are related many kinds of all industry parts of Architecture & interior Especially college students have needs for design part of architecture fit on study in these curriculum.

  • PDF

A Secure Operating System Architecture Based on Linux against Communication Offense with Root Exploit for Unmanned Aerial Vehicles

  • Koo, KwangMin;Lee, Woo-yeob;Cho, Sung-Ryung;Joe, Inwhee
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.42-48
    • /
    • 2020
  • This paper proposes an operating system architecture for unmanned aerial vehicle (UAV), which is secure against root exploit, resilient to connection loss resulting in the control loss, and able to utilize common applications used in Linux. The Linux-based UAVs are exposed to root exploit. On the other hand, the microkernel-based UAVs are not able to use the common applications utilized in Linux, even though which is secure against root exploit. For this reason, the proposed architecture uses a virtualized microkernel on the Linux operating system to isolate communication roles and prevent root exploit. As a result, the suggested Operating system is secure against root exploit and is able to utilize the common applications at the same time.