• Title/Summary/Keyword: Computing environment

Search Result 3,235, Processing Time 0.031 seconds

Decentralized Broker-BBsed Model for Resource Management in Grid Computing Environment (그리드 컴퓨팅 환경에서의 자원 관리를 위한 분산화된 브로커 기반 모델)

  • Ma, Yong-Beom;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.2
    • /
    • pp.1-8
    • /
    • 2007
  • Resource management in grid computing environment is essential for integration and interaction among heterogeneous resources. This paper discusses resource management methods of centralized and decentralized broker-based modeling for solving complex problems of resource management and presents design and development of the decentralized broker-based resource management modeling in grid computing environment. This model comprises a global resource broker and a local resource broker, and we derive reduction of communication and functional dispersion of Job management using a local resource broker. The simulation experiment shows the improvement of resource utilization and average response time and proves that this model improves utilization of resources and replies to user requests promptly.

  • PDF

A Model of Wireless Paging System Based on Context Aware Computing on Ubiquitous Environment

  • Han, Kook-Hee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.5
    • /
    • pp.141-149
    • /
    • 2006
  • Ubiquitous computing environment means the computing environment that has taken its position so closely with the ordinary living so much like air or water. In building up the U-Korea, one of the important issues is the social issue from the drasticincrease of senior population. The contemporary society has its distinct trend in increase of senior household following the nuclear family orientation, increase of working parents with the advancement of women in society, unable to support seniors for long distance or short distance of business trip and other reasons that the need of senior welfare has been ever more felt. Accordingly, the Ministry of Government Affairs and Home Administration has developed the wireless paging system to make prompt response system for 119 Rescue when the single senior is encountered with emergency situation that is has been widely provided for the socially neglected people such as single senior, the disabled persons and others. Currently, the wireless paging system is operated as the sub-system for emergency rescue informationsystem, but due to the lack of reliability of product, problems of terminal portable transmitter, receptor and others, rejection of beneficiary and lack of knowledge in use, insufficient management and supervision of managing officers, the efficiency has been declined that there is a need of development for the system. Therefore, this study proposes the context aware information structure of the subject of ubiquitous wireless paging system required forthe development of the wireless paging system model of ubiquitous environment that improved the problems of currently operated wireless paging system.

  • PDF

Study on mobile agents for the intrusion detection in pervasive computing environment (퍼베이시브 컴퓨팅 환경에서의 침입탐지용 모바일 에이전트에 대한 연구)

  • Oh, Byung-Jin;Um, Nam-Kyoung;Mun, Hyung-Jin;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.231-237
    • /
    • 2006
  • Pervasive computing environment is similar to the meaning of ubiquitous computing, however it is a kind of the commercial product, which is made from the collaboration between NIST and IBM. On the basis of this environment, the research of mobile agents for intrusion detection is going on in progress. In this paper, we study the research about mobile agents for the intrusion detection and then suggest scenarios using moving mobile agents based on the multiple mobile agents in the intrusion detection. Subsequently, we could figure out the problems which occurred through progress of integrity movement as a matter of the intrusion detection.

  • PDF

An Authentication Management using Biometric Information and ECC in IoT-Edge Computing Environments (IoT-EC 환경에서 일회용 생체정보와 ECC를 이용한 인증 관리)

  • Seungjin Han
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.1
    • /
    • pp.142-148
    • /
    • 2024
  • It is difficult to apply authentication methods of existing wired or wireless networks to Internet of Things (IoT) devices due to their poor environment, low capacity, and low-performance processor. In particular, there are many problems in applying methods such as blockchain to the IoT environment. In this paper, edge computing is used to serve as a server that authenticates disposable templates among biometric information in an IoT environment. In this environment, we propose a lightweight and strong authentication procedure using the IoT-edge computing (IoT-EC) system based on elliptic curve cryptographic (ECC) and evaluate its safety.

Virtual Optimal Design of Satellite Adapter in Parallel Computing Environment (병렬 컴퓨팅 환경 하에서 인공위성 어댑터 가상최적설계)

  • Moon, Jong-Keun;Yoon, Young-Ha;Kim, Kyung-Won;Kim, Sun-Won;Kim, Jin-Hee;Kim, Seung-Jo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.35 no.11
    • /
    • pp.973-982
    • /
    • 2007
  • In this paper, optimal design framework is developed by automatic mesh generation and PSO(Particle Swarm Optimization) algorithm based on parallel computing environment and applied to structural optimal design of satellite adapter module. By applying automatic mesh generation, it became possible to change the structural shape of adapter module. PSO algorithm was merged with parallel computing environment and for maximizing a computing performance, asynchronous PSO algorithm was developed and could reduce the computing time of optimization process. As constraint conditions, eigen-frequency and maximum stress was considered. Finally using optimal design framework, weight reduction of satellite adapter module is derived with satisfaction of structural safety.

A Relative Performance Index-based Job Migration in Grid Computing Environment (그리드 컴퓨팅 환경에서의 상대성능지수에 기반한 작업 이주)

  • Kim Young-Gyun;Oh Gil-Ho;Cho Kum Won;Ko Soon-Heum
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.4
    • /
    • pp.293-304
    • /
    • 2005
  • In this paper, we research on job migration in a grid computing environment with cactus and MPICH-C2 based on Globus. Our concepts are to perform job migration by finding the site with plenty of computational resources that would decrease execution time in a grid computing environment. The Migration Manager recovers the job from the checkpointing files and restarts the job on the migrated site. To select a migrating site, the proposed method considers system's performance index, cpu's load, network traffic to send migration job tiles and the execution time predicted on a migration site. Then it selects a site with maximal performance gains. By selecting a site with minimum migration time and minimum execution time. this approach implements a more efficient grid computing environment. The proposed method Is proved by effectively decreasing total execution time at the $K\ast{Grid}$.

Mobile Computing Algorithm on IEEE 802.11b for Ubiquitous Computing

  • Kim, Wu-Woan
    • Journal of the Korean Data and Information Science Society
    • /
    • v.19 no.1
    • /
    • pp.11-24
    • /
    • 2008
  • In this paper, the patterns of movement used in the mobile communication systems are adopted in the mobile computing environment to reduce handover delay and to support seamless handover for MIPv6 based on IEEE 802.11 networks. That is, RtSolPr message and PrRtAdv message can be treated before handover. As the result, it is possible to assign NCoA to MN and Next Access Router(NAR) before handover starts. This can minimize handover delay and reduce the total handover delay.

  • PDF

Personal Information Management System (PIMS) improvement research using cloud computing security (개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구)

  • Jeong, Hyein;Kim, Seongjun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.133-155
    • /
    • 2016
  • Recently, in the adoption of cloud computing are emerging as locations are key requirements of security and privacy, at home and abroad, several organizations recognize the importance of privacy in cloud computing environments and research-based transcription and systematic approach in progress have. The purpose of this study was to recognize the importance of privacy in the cloud computing environment based on personal information security methodology to the security of cloud computing, cloud computing, users must be verified, empirical research on the improvement plan. Therefore, for existing users of enhanced security in cloud computing security consisted framework of existing cloud computing environments. Personal information protection management system: This is important to strengthen security for existing users of cloud computing security through a variety of personal information security methodology and lead to positive word-of-mouth to create and foster the cloud industry ubiquitous expression, working environments.

Performance Evaluation of Scheduling Algorithms according to Communication Cost in the Grid System of Co-allocation Environment (Co-allocation 환경의 그리드 시스템에서 통신비용에 따른 스케줄링 알고리즘의 성능 분석)

  • Kang, Oh-Han;Kang, Sang-Seong;Kim, Jin-Suk
    • The KIPS Transactions:PartA
    • /
    • v.14A no.2
    • /
    • pp.99-106
    • /
    • 2007
  • Grid computing, a mechanism which uses heterogeneous systems that are geographically distributed, draws attention as a new paradigm for the next generation operation of parallel and distributed computing. The importance of grid computing concerning communication cost is very huge because grid computing furnishes uses with integrated virtual computing service, in which a number of computer systems are connected by a high-speed network. Therefore, to reduce the execution time, the scheduling algorithm in grid environment should take communication cost into consideration as well as computing ability of resources. However, most scheduling algorithms have not only ignored the communication cost by assuming that all tasks were dealt in one cluster, but also did not consider the overhead of communication cost when the tasks were processed in a number of clusters. In this paper, the functions of original scheduling algorithms are analyzed. More importantly, the functions of algorithms are compared and analyzed with consideration of communication cost within the co allocation environment, in which a task is performed separately in many clusters.