• 제목/요약/키워드: Computing environment

검색결과 3,235건 처리시간 0.03초

HTML5 Canvas를 활용한 시각적 공간분석 환경의 설계와 구현 (Design and Implementation of a Computing Environment for Geovisual Analytics Using HTML5 Canvas)

  • 박미라;박기호;안재성
    • 한국지리정보학회지
    • /
    • 제14권4호
    • /
    • pp.44-53
    • /
    • 2011
  • 이 연구에서는 HTML5 canvas를 활용하여 시각화 도구와 사용자와의 동적 상호작용을 지원하는 웹 기반의 시각적 공간 분석 환경을 설계하고 구현하였다. 분석 환경은 군집지도, 애니메이션 지도, 시간적 평행좌표 그림, 시계열 히트 맵 차트와 같은 시각화 도구로 구성되어 있다. 분석환경에서는 동일한 군집으로 분류된 지역의 속성 변화를 살펴볼 수 있는 다중창 배열과 선별적 강조를 기반으로 하는 패턴 탐색이 가능하다. 그리고 크로스 브라우저를 지원하기 때문에 다양한 정보 기기를 사용하는 컴퓨팅 환경에서도 활용할 수 있다.

Comparison of Distributed and Parallel NGS Data Analysis Methods based on Cloud Computing

  • Kang, Hyungil;Kim, Sangsoo
    • International Journal of Contents
    • /
    • 제14권1호
    • /
    • pp.34-38
    • /
    • 2018
  • With the rapid growth of genomic data, new requirements have emerged that are difficult to handle with big data storage and analysis techniques. Regardless of the size of an organization performing genomic data analysis, it is becoming increasingly difficult for an institution to build a computing environment for storing and analyzing genomic data. Recently, cloud computing has emerged as a computing environment that meets these new requirements. In this paper, we analyze and compare existing distributed and parallel NGS (Next Generation Sequencing) analysis based on cloud computing environment for future research.

유비쿼터스 컴퓨팅 환경에서의 스트림 암호 설계 고찰 (A Study on the Design Concept of Stream Cipher Algorithm in Ubiquitous Computing)

  • 김화영;김은홍
    • 한국IT서비스학회지
    • /
    • 제3권1호
    • /
    • pp.101-115
    • /
    • 2004
  • The phrase "Ubiquitous Computing" has become popular ever since Mark Weiser used it in an article. It is to realize a computerized environment in which small computers are embedded and cooperate with each other. This environment will support many activities of our daily life. In a Ubiquitous Computing environment, various devices will be connected to the network from houses and buildings. Therefore it is necessary to ensure network security and to protect private data from tapping, falsification and the disguising of identity by others. This study reviews the Ubiquitous Computing technologies in detail and outlines the design concept of the Stream Cipher Algorithm.

클라우드 컴퓨팅의 신뢰성 향상 방안에 관한 연구 (A Study on Improving the Reliability of Cloud Computing)

  • 양정모
    • 디지털산업정보학회논문지
    • /
    • 제8권4호
    • /
    • pp.107-113
    • /
    • 2012
  • Cloud computing has brought changes to the IT environment. Due to the spread of LTE, users of cloud services are growing more. This which provides IT resources to meet the needs of users of cloud services are noted as a core industry. But it is not activated because of the security of personal data and the safety of the service. In order to solve this, intrusion detection system is constructed as follows. This protects individual data safely which exists in the cloud and also protects information exhaustively from malicious attack. The cause of most attack risk which exists to cloud computing can find in distributed environment. In this study, we analyzed about necessary property of network-based intrusion detection system that process and analyze large amount of data which occur in cloud computing environment. Also, we studied functions which detect and correspond attack occurred in interior of virtualization.

퍼베이시브 컴퓨팅 환경에서 소셜네트워크를 이용한 프로액티브 친구 추천 기법 (Proactive Friend Recommendation Method using Social Network in Pervasive Computing Environment)

  • 권준희
    • 디지털산업정보학회논문지
    • /
    • 제9권1호
    • /
    • pp.43-52
    • /
    • 2013
  • Pervasive computing and social network are good resources in recommendation method. Collaborative filtering is one of the most popular recommendation methods, but it has some limitations such as rating sparsity. Moreover, it does not consider social network in pervasive computing environment. We propose an effective proactive friend recommendation method using social network and contexts in pervasive computing environment. In collaborative filtering method, users need to rate sufficient number of items. However, many users don't rate items sufficiently, because the rating information must be manually input into system. We solve the rating sparsity problem in the collaboration filtering method by using contexts. Our method considers both a static and a dynamic friendship using contexts and social network. It makes more effective recommendation. This paper describes a new friend recommendation method and then presents a music friend scenario. Our work will help e-commerce recommendation system using collaborative filtering and friend recommendation applications in social network services.

Blockchain based Application to Electric Vehicle in IoT environment

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Song, You-Jin
    • International Journal of Advanced Culture Technology
    • /
    • 제10권2호
    • /
    • pp.233-239
    • /
    • 2022
  • Recently, research is being conducted on the rapid service provision and reliability of the instance-based rather than the existing IP-based structure. Research is mainly conducted through Block cloud, a platform that combines service-centric networking (SCN) and blockchain. In addition, the Internet of Things network has been proposed as a fog computing environment in the structure of the existing cloud computing. Fog computing is an environment suitable for real-time information processing. In this paper, we propose a new Internet network structure based on fog computing that requires real-time for rapid processing of IoT services. The proposed system applies IoTA, the third-generation blockchain based on DAG, to the block cloud. In addition, we want to propose a basic model of the object block chain and check the application services of electric vehicles.

유비쿼터스 컴퓨팅 환경에서의 컨텍스트 접근 제어 고찰 (Context Access Control in Ubiquitous Computing Environment)

  • 정헌만;이세훈
    • 한국컴퓨터정보학회지
    • /
    • 제14권1호
    • /
    • pp.175-184
    • /
    • 2006
  • 이 연구에서는 유비쿼터스 컴퓨팅 환경에서 정보 보안 문제를 접근 제어 기법을 중심으로 두가지 방식에 대한 연구 형태를 분석 고찰하며, 기존 연구들의 장단점을 비교하여 유비쿼터스 환경에서의 상황 인식 서비스 플랫폼 개발시 핵심적으로 고려해야할 중요 요소를 설계할 때 필요한 레퍼런스를 제안한다. 첫 번째는, 유비쿼터스 환경에서 역할 기반 접근 제어 방식을 적용하는데 문제점을 상황 정보를 활용하여 해결하는 연구 방향에 대한 고찰이다. 두 번째는, 유비쿼터스 환경에서 상황 정보는 개인의 정보 보호에 관련해 중요한 사항이므로, 여기에 역할 기반 접근 제어 방법을 적용하여 해결하는 연구이다. 이러한 두 가지 연구 방향은 상황 인식 서비스 플랫폼 설계시 중요하게 고려해야 할 사항이다.

  • PDF

클라이언트 가상화를 이용한 중요정보 보호 (Important Information Protection using Client Virtualization)

  • 임세정;김광준;강태근
    • 한국전자통신학회논문지
    • /
    • 제6권1호
    • /
    • pp.111-117
    • /
    • 2011
  • 본 논문에서는 클라이언트 가상화 기술을 이용하여 로컬 컴퓨팅 환경의 성능 저하를 최소화 하고 가상화된 사용자 영역에서 사용자가 필요한 기능을 사용할 수 있도록 효율적으로 제공하며, 로컬 컴퓨팅 환경의 중요정보 보호와 성능의 안정성 및 지속성을 유지하였다. 또한 로컬 컴퓨팅 환경 뿐만 아니라 악성코드와 같은 공격으로부터 가상화된 영역을 보호하기 위한 방법을 제안함으로서 가상화된 영역에 있는 데이터들의 암호화를 통하여 가상화된 사용자 영역의 보안을 극대화시켰다. 가상화를 통해 로컬 컴퓨팅 자원을 그대로 사용하면서 효율적으로 로컬 컴퓨팅 시스템으로부터 하나의 사용자 컴퓨팅 리소스를 분리시키는 것과 같은 효과를 얻을 수 있다.

An Internet-based computing framework for the simulation of multi-scale response of structural systems

  • Chen, Hung-Ming;Lin, Yu-Chih
    • Structural Engineering and Mechanics
    • /
    • 제37권1호
    • /
    • pp.17-37
    • /
    • 2011
  • This paper presents a new Internet-based computational framework for the realistic simulation of multi-scale response of structural systems. Two levels of parallel processing are involved in this frame work: multiple local distributed computing environments connected by the Internet to form a cluster-to-cluster distributed computing environment. To utilize such a computing environment for a realistic simulation, the simulation task of a structural system has been separated into a simulation of a simplified global model in association with several detailed component models using various scales. These related multi-scale simulation tasks are distributed amongst clusters and connected to form a multi-level hierarchy. The Internet is used to coordinate geographically distributed simulation tasks. This paper also presents the development of a software framework that can support the multi-level hierarchical simulation approach, in a cluster-to-cluster distributed computing environment. The architectural design of the program also allows the integration of several multi-scale models to be clients and servers under a single platform. Such integration can combine geographically distributed computing resources to produce realistic simulations of structural systems.

Deep Learning Based Security Model for Cloud based Task Scheduling

  • Devi, Karuppiah;Paulraj, D.;Muthusenthil, Balasubramanian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권9호
    • /
    • pp.3663-3679
    • /
    • 2020
  • Scheduling plays a dynamic role in cloud computing in generating as well as in efficient distribution of the resources of each task. The principle goal of scheduling is to limit resource starvation and to guarantee fairness among the parties using the resources. The demand for resources fluctuates dynamically hence the prearranging of resources is a challenging task. Many task-scheduling approaches have been used in the cloud-computing environment. Security in cloud computing environment is one of the core issue in distributed computing. We have designed a deep learning-based security model for scheduling tasks in cloud computing and it has been implemented using CloudSim 3.0 simulator written in Java and verification of the results from different perspectives, such as response time with and without security factors, makespan, cost, CPU utilization, I/O utilization, Memory utilization, and execution time is compared with Round Robin (RR) and Waited Round Robin (WRR) algorithms.