• Title/Summary/Keyword: Computing ability

Search Result 382, Processing Time 0.027 seconds

Dynamic Resource Allocation in Distributed Cloud Computing (분산 클라우드 컴퓨팅을 위한 동적 자원 할당 기법)

  • Ahn, TaeHyoung;Kim, Yena;Lee, SuKyoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.7
    • /
    • pp.512-518
    • /
    • 2013
  • A resource allocation algorithm has a high impact on user satisfaction as well as the ability to accommodate and process services in a distributed cloud computing. In other words, service rejections, which occur when datacenters have no enough resources, degrade the user satisfaction level. Therefore, in this paper, we propose a resource allocation algorithm considering the cloud domain's remaining resources to minimize the number of service rejections. The resource allocation rate based on Q-Learning increases when the remaining resources are sufficient to allocate the maximum allocation rate otherwise and avoids the service rejection. To demonstrate, We compare the proposed algorithm with two previous works and show that the proposed algorithm has the smaller number of the service rejections.

An Interactive Multi-Factor User Authentication Framework in Cloud Computing

  • Elsayed Mostafa;M.M. Hassan;Wael Said
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.63-76
    • /
    • 2023
  • Identity and access management in cloud computing is one of the leading significant issues that require various security countermeasures to preserve user privacy. An authentication mechanism is a leading solution to authenticate and verify the identities of cloud users while accessing cloud applications. Building a secured and flexible authentication mechanism in a cloud computing platform is challenging. Authentication techniques can be combined with other security techniques such as intrusion detection systems to maintain a verifiable layer of security. In this paper, we provide an interactive, flexible, and reliable multi-factor authentication mechanisms that are primarily based on a proposed Authentication Method Selector (AMS) technique. The basic idea of AMS is to rely on the user's previous authentication information and user behavior which can be embedded with additional authentication methods according to the organization's requirements. In AMS, the administrator has the ability to add the appropriate authentication method based on the requirements of the organization. Based on these requirements, the administrator will activate and initialize the authentication method that has been added to the authentication pool. An intrusion detection component has been added to apply the users' location and users' default web browser feature. The AMS and intrusion detection components provide a security enhancement to increase the accuracy and efficiency of cloud user identity verification.

Study of Aerodynamic Design Optimization Using Genetic Algorithm (유전 알고리즘을 이용한 공력 형상 최적화 연구)

  • Kim S. W.;Kwon J. H.
    • Journal of computational fluids engineering
    • /
    • v.6 no.3
    • /
    • pp.10-18
    • /
    • 2001
  • Genetic Algorithm(GA) is applied to aerodynamic shape optimization and demonstrated its merits in global searching ability and the independency of differentiability. However, applications of GA are limited due to slow convergence rate, premature termination, and high computing costs. The present aerodynamic designs such as wing shape optimizations using GA have seldom been applied because of high computing costs. This paper has two objects; improvement of the efficiency of GA and application of GA into aerodynamic shape optimization for 2D and 3D wings. The study indicates that GA can be applied to aerodynamic design and its performance is comparable to traditional design methods.

  • PDF

A Practical Study on Data Analysis Framework for Teaching 3D Printing in Elementary School

  • Kim, Woo Yeol
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.73-82
    • /
    • 2016
  • The computational thinking refers to the ability to solve the complex and a variety of problems by utilizing a computer in core of the software education. It create a model through data collection and analysis and realize that the computer can understand to solve problems. Recently, the educational application of 3D printer appears in importance, which is one method to improve the computing thinking. In this paper, we propose the data analysis framework to stretch the computing thinking of learner that can incorporate 3D printing technology to the current elementary school curriculum and apply in a case study.

JXTA Based P2P Services for Mobile Devices

  • Park, Hae-Woo;Jung, Hun;Seo, Yeung-Su;Yu, Chun-Gun;Lee, Jun-Hyuk;Kang, Byung-Wook
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.195-198
    • /
    • 2008
  • The JXTA was made in order to solve the problem of being generated with the computer platform suggested with the P2P(Peer-to-peer) method in the distributed computing. JXTA makes a communication between the various network and the devices is connected to a network which possible. It was designed to the client having the minimum computing ability could attend in the peer-to-peer network. However, for smoothly applying JXTA in the wireless environment, there is a limit with the limited resource of the Mobile Device. By using the Relay of the JXTA based for the Mobile Device, this paper implemented the P2P service which is flexibly effective in the wireless network environment.

  • PDF

Proposal of Container-Based HPC Structures and Performance Analysis

  • Yong, Chanho;Lee, Ga-Won;Huh, Eui-Nam
    • Journal of Information Processing Systems
    • /
    • v.14 no.6
    • /
    • pp.1398-1404
    • /
    • 2018
  • High-performance computing (HPC) provides to researchers a powerful ability to resolve problems with intensive computations, such as those in the math and medical fields. When an HPC platform is provided as a service, users may suffer from unexpected obstacles in developing and running applications due to restricted development environments and dependencies. In this context, operating system level virtualization can be a solution for HPC service to ensure lightweight virtualization and consistency in Dev-Ops environments. Therefore, this paper proposes three types of typical HPC structure for container environments built with HPC container and Docker. The three structures focus on smooth integration with existing HPC job framework, message passing interface (MPI). Lastly, the performance of the structures is analyzed with High Performance Linpack benchmark from the aspect of performance degradation in network communications under Docker.

Distributed Denial of Service Defense on Cloud Computing Based on Network Intrusion Detection System: Survey

  • Samkari, Esraa;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.67-74
    • /
    • 2022
  • One type of network security breach is the availability breach, which deprives legitimate users of their right to access services. The Denial of Service (DoS) attack is one way to have this breach, whereas using the Intrusion Detection System (IDS) is the trending way to detect a DoS attack. However, building IDS has two challenges: reducing the false alert and picking up the right dataset to train the IDS model. The survey concluded, in the end, that using a real dataset such as MAWILab or some tools like ID2T that give the researcher the ability to create a custom dataset may enhance the IDS model to handle the network threats, including DoS attacks. In addition to minimizing the rate of the false alert.

ACCELERATED STRONGLY CONVERGENT EXTRAGRADIENT ALGORITHMS TO SOLVE VARIATIONAL INEQUALITIES AND FIXED POINT PROBLEMS IN REAL HILBERT SPACES

  • Nopparat Wairojjana;Nattawut Pholasa;Chainarong Khunpanuk;Nuttapol Pakkaranang
    • Nonlinear Functional Analysis and Applications
    • /
    • v.29 no.2
    • /
    • pp.307-332
    • /
    • 2024
  • Two inertial extragradient-type algorithms are introduced for solving convex pseudomonotone variational inequalities with fixed point problems, where the associated mapping for the fixed point is a 𝜌-demicontractive mapping. The algorithm employs variable step sizes that are updated at each iteration, based on certain previous iterates. One notable advantage of these algorithms is their ability to operate without prior knowledge of Lipschitz-type constants and without necessitating any line search procedures. The iterative sequence constructed demonstrates strong convergence to the common solution of the variational inequality and fixed point problem under standard assumptions. In-depth numerical applications are conducted to illustrate theoretical findings and to compare the proposed algorithms with existing approaches.

A Study on Creative and Convergent SW Education Programs for improving Computational Thinking

  • Lee, Myung-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.93-100
    • /
    • 2017
  • After the fourth industrial revolution came along, SW education to improve creativity and problem-solving ability began in elementary, middle, and high schools first and then in universities as well positively; however, research on the curriculum or what it has to pursue is not yet enough. Here, this study will investigate the current status of SW education provided in software-oriented schools operated in universities and also given as cultural studies in general universities and examines the curriculum or the standard plan for education. In most schools, it is operated as similar subject names, and diverse methods are tried on- and off-line to cultivate computing thinking skills. Also, to study SW education programs that can be operated in the general cultural courses of universities and find out how to utilize them, this author suggests the goal setting, educational contents, and teaching methods for SW education. As follow-up tasks, it will be needed to apply the suggested programs to the field and find out new evaluation methods in order to cultivate creative and convergent persons of ability.

Design of Collaboration Service for CORBA Based Multimedia Applications (CORBA 기반 멀티미디어 응용을 위한 공동작업 서비스 설계)

  • Kim, Nam-Yong;Lee, Seung-Geun;Wang, Chang-Jong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.562-570
    • /
    • 1999
  • Information superhighway and improvement of computing power result in increase of the requirements for distributed multimedia applications. But, developer of applications needs much time and efforts because of the difficulties of development, enhancement and maintenance of distributed applications. To solve this problem, CORBA is used widely. But, the definitions of CORBA services are required for the brief developments of distributed multimedia applications. Especially, collaboration service is required because multiple users use distributed multimedia service. Collaboration service manages user and group information of applications and makes the interoperability between of multi users. In this paper, we designed collaboration service for CORBA based distributed multimedia applications. Collaboration service is able to maintain group information and to present the ability for collaborative works between of multi users. Application developers can develop the applications easily because the ability of collaborative works is offered by collaboration service.

  • PDF