• Title/Summary/Keyword: Computing System

Search Result 5,858, Processing Time 0.056 seconds

Evaluating End-User Computing Capability in Total Perspective

  • Yoon, Chui-Young
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.357-362
    • /
    • 2007
  • This study presents a methodology that efficiently evaluates and interprets the end-user computing capability in a total perspective in a computing environment. The evaluation system has an evaluation tool, evaluation method and process, and an interpretation system. The validity and reliability of the developed tool construct was verified by factor and reliability analysis with the application of SPSS software. The application and utilization of the developed system was confirmed by applying it to evaluating the computing competency of 316 workers in an enterprise and presenting its evaluation results. This will contribute to developing a methodology for totally evaluating and interpreting the end-user computing capability and improving their computing capability in industrial fields.

  • PDF

On the Performance of Oracle Grid Engine Queuing System for Computing Intensive Applications

  • Kolici, Vladi;Herrero, Albert;Xhafa, Fatos
    • Journal of Information Processing Systems
    • /
    • v.10 no.4
    • /
    • pp.491-502
    • /
    • 2014
  • In this paper we present some research results on computing intensive applications using modern high performance architectures and from the perspective of high computational needs. Computing intensive applications are an important family of applications in distributed computing domain. They have been object of study using different distributed computing paradigms and infrastructures. Such applications distinguish for their demanding needs for CPU computing, independently of the amount of data associated with the problem instance. Among computing intensive applications, there are applications based on simulations, aiming to maximize system resources for processing large computations for simulation. In this research work, we consider an application that simulates scheduling and resource allocation in a Grid computing system using Genetic Algorithms. In such application, a rather large number of simulations is needed to extract meaningful statistical results about the behavior of the simulation results. We study the performance of Oracle Grid Engine for such application running in a Cluster of high computing capacities. Several scenarios were generated to measure the response time and queuing time under different workloads and number of nodes in the cluster.

MODELLING THE PERFORMANCE OF A CLIENT/SERVER DATABASE SYSTEM

  • Lee, Hui-Seok
    • Proceedings of the Korea Database Society Conference
    • /
    • 1994.09a
    • /
    • pp.49-69
    • /
    • 1994
  • A client/server system has become the computing architecture for the business organization which seeks competitive edges. Technically, a client/server system places application processing close to the user and thus increases performance. This paper's two primary goals are (i) to present a performance model for client/server database systems and (ii) to demonstrate analytically the effectiveness of client/server computing in comparison with other computing architectures via an illustrative example. The model is most likely to be used as a practical performance guide for client/server computing.

  • PDF

A MBASE-based Development Method for Ubiquitous Computing Systems (MBASE를 적용한 유비쿼터스 컴퓨팅 시스템 개발 방법론)

  • Kim, Sangsoo;Lee, Donghyun;In, Hoh
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.1 no.2
    • /
    • pp.5-11
    • /
    • 2005
  • Ubiquitous computing is an emerging technic for various areas such as public, private (individual), military, industrial, medical sectors. The applications of ubiquitous computing are expected to be prevailed from home to office. Unfortunately, it is not effective to apply existing system/software development methodologies into this emerging ubiquitous computing applications. In this paper, MBASE (Model-Based system Architecting and Software Engineering) is applied as a development method of ubiquitous computing applications. The advantage of MBASE is to identify mismatches of product, process, property, and success models and resolve them in developing the ubiquitous computing applications. A SmartView, a ubiquitous computing application, is presented as a case study o f MBASE.

  • PDF

The Design of Dynamic Fog Cloud System using mDBaaS

  • Hwang, Chigon;Shin, Hyoyoung;Lee, Jong-Yong;Jung, Kyedong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.59-66
    • /
    • 2017
  • Cloud computing has evolved into a core computing infrastructure for the internet that encompasses content, as well as communications, applications and commerce. By providing powerful computing and communications capabilities in the palm of the hand everywhere with a variety of smart devices, mobile applications such as virtual reality, sensing and navigation have emerged and radically changed the patterns people live. The data that is generated is getting bigger. Cloud computing, on the other hand, has problems with system load and speed due to the collection, processing and control of remote data. To solve this problem, fog computing has been proposed in which data is collected and processed at an edge. In this paper, we propose a system that dynamically selects a fog server that acts as a cloud in the edge. It serves as a mediator in the cloud, and provides information on the services and systems belonging to the cloud to the mobile device so that the mobile device can act as a fog. When the role of the fog system is complete, we provide it to the cloud to virtualize the fog. The heterogeneous problem of data of mobile nodes can be solved by using mDBaaS (Mobile DataBase as a Service) and we propose a system design method for this.

Wearable Computing System for the bland persons (시각 장애우를 위한 Wearable Computing System)

  • Kim, Hyung-Ho;Choi, Sun-Hee;Jo, Tea-Jong;Kim, Soon-Ju;Jang, Jea-In
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.261-263
    • /
    • 2006
  • Nowadays, technologies such as RFID, sensor network makes our life comfortable more and more. In this paper we propose a wearable computing system for blind and deaf person who can be easily out of sight from our technology. We are making a wearable computing system that is consisted of embedded board to processing data, ultrasonic sensors to get distance data and motors that make vibration as a signal to see the screen for a deaf person. This system offers environmental informations by text and voice. For example, distance data from a obstacle to a person are calculated by data compounding module using sensed ultrasonic reflection time. This data is converted to text or voice by main processing module, and are serviced to a handicapped person. Furthermore we will extend this system using a voice recognition module and text to voice convertor module to help communication among the blind and deaf persons.

  • PDF

Applying Ubiquitous Computing Technology to Proactive and Personalized Decision Support System (유비쿼터스 컴퓨팅 기술을 적용한 차세대형 의사결정지원시스템)

  • Kwon, Oh-Byung;Yoo, Kee-Dong;Suh, Eui-Ho
    • Asia pacific journal of information systems
    • /
    • v.15 no.2
    • /
    • pp.195-218
    • /
    • 2005
  • The emergence of ubiquitous computing environment will change the service architecture of business information systems such as Decision Support System(DSS), which will be a new application. Recent mobile DSSs allow the decision makers to be benefited from web and mobile technology. However, they seldom refer to context data, which are useful for proactive decision support. Meanwhile, ubiquitous applications so far provide restricted personalization service using context and preference of the user, that is, they do not fully make use of decision making capabilities. Hence, this paper aims to describe how the decision making capability and context-aware computing are jointly used to establish ubiquitous applications. To do so, an amended DSS paradigm: CKDDM(Context-Knowledge-Dialogue-Data-Model) is proposed in this paper. What will be considered for the future decision support systems when we regard ubiquitous computing technology as an inevitable impact that enforces the change of the way of making decisions are described. Under the CKDDM paradigm, a framework of ubiquitous decision support systems(ubiDSS) is addressed with the description of the subsystems within. To show the feasibility of ubiDSS, a prototype system, CAMA-myOpt(Context-Aware Multi Agent System-My Optimization) has been implemented as an illustrative example system.

Implementation of an Intelligent Grid Computing Architecture for Transient Stability Constrained TTC Evaluation

  • Shi, Libao;Shen, Li;Ni, Yixin;Bazargan, Masound
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.1
    • /
    • pp.20-30
    • /
    • 2013
  • An intelligent grid computing architecture is proposed and developed for transient stability constrained total transfer capability evaluation of future smart grid. In the proposed intelligent grid computing architecture, a model of generalized compute nodes with 'able person should do more work' feature is presented and implemented to make full use of each node. A timeout handling strategy called conditional resource preemption is designed to improve the whole system computing performance further. The architecture can intelligently and effectively integrate heterogeneous distributed computing resources around Intranet/Internet and implement the dynamic load balancing. Furthermore, the robustness of the architecture is analyzed and developed as well. The case studies have been carried out on the IEEE New England 39-bus system and a real-sized Chinese power system, and results demonstrate the practicability and effectiveness of the intelligent grid computing architecture.

Design and Implement Ubiquitous System on Chip for IEEE 802.15.4 WPAN Standard

  • Doo, Kyoung;Kim, Young-Sam;Kim, Sun-Kuk;Lee, Kang-Whan
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.697-698
    • /
    • 2008
  • Ubiquitous Computing System is available anytime, anywhere communications and computing systems, and information sharing and mutual cooperation between computing systems. in addition, For Ubiquitous Computing System, it is need the sensor technology to detect information of users and surrounding environment. For these reason, this paper proposed CRS(Context Recognition Switch) and DOS(Dynamic and Optimal Standard) based Context-awareness system architecture.

  • PDF

A Enhanced Security Model for Cloud Computing in SSO Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.55-61
    • /
    • 2017
  • Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.