• Title/Summary/Keyword: Computer usage

Search Result 1,229, Processing Time 0.036 seconds

Energy-aware Multi-dimensional Resource Allocation Algorithm in Cloud Data Center

  • Nie, Jiawei;Luo, Juan;Yin, Luxiu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4320-4333
    • /
    • 2017
  • Energy-efficient virtual resource allocation algorithm has become a hot research topic in cloud computing. However, most of the existing allocation schemes cannot ensure each type of resource be fully utilized. To solve the problem, this paper proposes a virtual machine (VM) allocation algorithm on the basis of multi-dimensional resource, considering the diversity of user's requests. First, we analyze the usage of each dimension resource of physical machines (PMs) and build a D-dimensional resource state model. Second, we introduce an energy-resource state metric (PAR) and then propose an energy-aware multi-dimensional resource allocation algorithm called MRBEA to allocate resources according to the resource state and energy consumption of PMs. Third, we validate the effectiveness of the proposed algorithm by real-world datasets. Experimental results show that MRBEA has a better performance in terms of energy consumption, SLA violations and the number of VM migrations.

The Adaptive SPAM Mail Detection System using Clustering based on Text Mining

  • Hong, Sung-Sam;Kong, Jong-Hwan;Han, Myung-Mook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.2186-2196
    • /
    • 2014
  • Spam mail is one of the most general mail dysfunctions, which may cause psychological damage to internet users. As internet usage increases, the amount of spam mail has also gradually increased. Indiscriminate sending, in particular, occurs when spam mail is sent using smart phones or tablets connected to wireless networks. Spam mail consists of approximately 68% of mail traffic; however, it is believed that the true percentage of spam mail is at a much more severe level. In order to analyze and detect spam mail, we introduce a technique based on spam mail characteristics and text mining; in particular, spam mail is detected by extracting the linguistic analysis and language processing. Existing spam mail is analyzed, and hidden spam signatures are extracted using text clustering. Our proposed method utilizes a text mining system to improve the detection and error detection rates for existing spam mail and to respond to new spam mail types.

Analysis Performance Characterics of Dynamic Signature File Methods

  • Yoo, Jae-Soo;Choi, Kil-Seong;Kim, Myoung-Ho
    • Journal of Electrical Engineering and information Science
    • /
    • v.2 no.4
    • /
    • pp.37-45
    • /
    • 1997
  • With rapid increase of information requirements from various application areas, there has been much research on dynamic information storage structures that effectively support insertions, deletions and updates. In this appear we evaluate the performance of he existing dynamic signature file methods such as the S-tree, Quick Filter and HS file and provide guidelines for the most effective usage to a given operational environment. We derive analytic performance evaluation models of the storage structures based on retrieval time, storage overhead and insertion time. We also perform extensive experiments with various data distributions such as uniform, normal and exponential distributions. The relationships among various performance parameters are throughly investigated. We show through performance comparison based on analytic models and experiments that regardless of data distribution, the HS file significantly improves performance in both the retreival time and the storage overhead over S-tree and Quick Filter.

  • PDF

Correction of Text Character Skeleton for Effective Trajectory Recovery

  • Vu, Hoai Nam;Na, In Seop;Kim, Soo Hyung
    • International Journal of Contents
    • /
    • v.11 no.3
    • /
    • pp.7-13
    • /
    • 2015
  • One of the biggest problems of skeletonization is the occurrence of distortions at the junction point of the final binary image. At the junction area, a single point usually becomes a small stroke, and the corresponding trajectory task, as well as the OCR, consequently becomes more complicated. We therefore propose an adaptive post-processing method that uses an adaptive threshold technique to correct the distortions. Our proposed method transforms the distorted segments into a single point so that they are as similar to the original image as possible, and this improves the static handwriting images after the skeletonization process. Further, we attained promising results regarding the usage of the enhanced skeletonized images in other applications, thereby proving the expediency and efficiency of the proposed method.

Impediment to Device Utility Through the Constraint on USIM Card Usage Range (USIM 사용 범위 제한을 통한 장치 활용성의 저해)

  • Shin, Hyeon-Jun;Youn, Hee-Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.01a
    • /
    • pp.349-352
    • /
    • 2014
  • 본 논문에서는 WCDMA, LTE에 이르기까지 USIM을 사용한 국내 이동통신서비스 시장에서 단말기정보를 사용하여 USIM에 의한 사용자 인증을 제한하여 이용자의 정상적인 통신서비스의 이용을 제한하는 현상이 벌어지고 있는것과 관련하여 국내에서 USIM을 사용하기 시작한 뒤부터 최근에 이르기까지 어떻게 이용자의 USIM 사용을 제한하여 장치 활용성을 저해하여 왔는지에 대한 방법과, 이로 인하여 유비쿼터스 컴퓨팅의 5-Any 중(中) 하나인 Any-Device성(性)을 저해하는 현상과 영향에 대하여 논한다.

  • PDF

A Study on the Factors in the use of Office Automation Information Technology (사무자동화 정보기술 이용의 영향요인에 관한 실증연구)

  • 곽두진;김성국;이정관
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.3
    • /
    • pp.121-129
    • /
    • 1999
  • The purpose of this study is to examine the effects of Critical Factors in the use of Personal Computer, Office Automation Information Technology. The author presents a therortical model related Office Automation Information Technology by end-users and suggests how this model should be conceptualized. A model was estimated with data from 98 end-users. The results revealed that degree of organizational support. demographic charateristic, and useful to the task was positively related to usage of Office Automation Information Technology.

Analysis and Optimal Control of Linear Time-delay Systems via Fast Walsh Transform (고속윌쉬변환에 의한 선형시지연계의 해석 및 최적제어)

  • Han, Sang-In;Lee, Myeong-Gyu;Kim, Jin-Tae;An, Du-Su
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.5
    • /
    • pp.601-606
    • /
    • 1999
  • A Walsh function method is proposed in this report for the analysis and optimal control of linear time-delay systems, which is based on the Picard's iterative approximation and fast Walsh transformation. In this research, the following results are obtained: 1) The differential and integral equation can be solved by transforming into a simple algebraic equation as it was possible with the usual orthogonal function method: 2) General orthogonal function methods require usage of Walsh operational matrices for delay or advance and many calculations of inverse matrices, which are not necessary in this method. Thus, the control problems of linear time-delay systems can be solved much faster and readily.

  • PDF

Preventing Unauthorized Software Usage by Internet Authentication and Encryption of Secondary Files (인터넷 인증 및 2차 생성 파일 암호화를 이용한 소프트웨어 부정 사용 방지 기술)

  • Park, Sung-Ha;Chae, Dong-Kyu;Kim, Sang-Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.435-436
    • /
    • 2014
  • 소프트웨어의 불법 복제 및 인증을 거치지 않은 부정 사용 등이 큰 문제가 되고 있다. 소프트웨어 부정 사용을 막기 위해 usb 인증, 시리얼 키 인증, 서버접속을 통한 인증 등 다양한 방법들이 존재해 왔다. 그러나 이러한 기술들의 우회 방법들이 상당수 공개된 실정이다. 본 연구에서는 보다 강화된 인터넷 인증 기반의 불법 사용 방지 기술을 제안하고자 한다. 뿐만 아니라 소프트웨어를 사용해 만들어 낸 2차 창작물 또한 보호하는 방법을 제시하고자 한다.

On the Scale in the Kingdom of Saudi Arabia: Facebook vs. Snapchat

  • Alghamdi, Deena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.131-136
    • /
    • 2021
  • This research aims to analyse the practices adopted by social media users in the Kingdom of Saudi Arabia (KSA), specifically users of Facebook and Snapchat. To collect data from participants, a questionnaire was used, generating 915 responses. The analysis of the data shows a clear preference for Snapchat over Facebook in the KSA, where 89% of the participants have accounts on Snapchat compared to 66% of them with accounts on Facebook. Moreover, the preference for Snapchat over Facebook has been clearly shown in the daily usage of participants, where 83% of those with Snapchat accounts can be described as very active users. They have accessed their Snapchat accounts at least once a day compared to only 15% of Facebook users. Different reasons were provided by the participants explaining the practices they adopted. We believe that such research could help social media applications' designers and policy makers to understand the behaviour of users in the KSA when using social media applications and the rationale behind their behaviour and preferences. This understanding could help improve the performance of current applications and new ones.