• Title/Summary/Keyword: End-user computing

Search Result 132, Processing Time 0.022 seconds

Difference in Percieved Effectiveness between Two Types of IS Outsourcing : Integrated vs. Backend (정보시스템 기능의 외부위탁(outsourcing) 유형에 따른 인식된 효과성에 관한 연구)

  • An, Jung-Ho;Park, Ji-Sang
    • Asia pacific journal of information systems
    • /
    • v.4 no.2
    • /
    • pp.165-187
    • /
    • 1994
  • This paper tests whether there are any differences in perceived effectiveness according to the range of outsourcing, and we tried to identify the reasons if any. By executing a field survey and T-test on composite success measure value of two types (integrated outsourcing type and backend outsourcing type), we testified that the perceived effectiveness of the two types in outsourcing was not different. Discussion fo the stududy result followed. First, 'integrated outsourcing type' does not generate very excellent performance. Second, so far the characteristics of 'integrated outsourcing type' such as strategic management of IS, activating end-user computing(EUC), and making the strategic partnership with vendors and so on have not been successfully utilized as expected.

  • PDF

An analysis of Network I/O Performance for Effective VM Management under Cloud CDN Environment (클라우드 CDN 환경에서의 효과적인 VM 관리를 위한 네트워크 I/O 성능 분석)

  • Hyeon, Myeongseok;Kim, Heejae;Youn, Chan-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.156-159
    • /
    • 2015
  • 최근 콘텐츠 전송 네트워크(content delivery network, CDN)와 클라우드 컴퓨팅(cloud computing)을 결합하여 효과적으로 콘텐츠를 전달하기 위한 방법이 대두되고 있으며 이와 같이 클라우드 컴퓨팅과 결합하여 서비스되는 CDN을 클라우드 CDN 이라고 칭한다. 본 논문에서는 클라우드 CDN 환경에서의 효과적인 가상 머신 (virtual machine, VM) 관리를 위한 캐시서버(caching server)로써의 VM의 네트워크 I/O 성능 분석을 다룬다. 해당 성능 분석은 엔드 유저(end-user)들과 캐시서버 간 동영상 스트리밍(streaming)을 통하여 이루어졌으며 해당 캐시 서버의 네트워크 I/O 성능에 영향을 주는 다양한 경우에 대하여 진행되었다. 본 논문에서의 성능 분석은 클라우드 CDN 환경에서의 데이터센터(datacenter) 선택 및 요청 라우팅(routing) 등에 적용될 수 있다.

A rule based file management tool for facility log files integration in disaster environments

  • Lee, Young-Geol;Lee, Younlae;Kim, Hyunah;Jang, Yeonyi;Park, Minjae
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.73-82
    • /
    • 2018
  • We often experience complex presence of files within the compute environment. It could be an end-user's desktop environment or a professional part of file management. We would like to suggest one way to manage these different cases of duplicate files. It is a rule-based file management tool, and we want to use it as a tool to consolidate facility management log files. In this paper, we will describe the rule-based file management tools and show examples of how files are managed using them. We are interested in the management of the disaster environment and would like to apply this method to the management of log data related to facilities to be considered in the event of a disaster.

Towards the Acceptance of Functional Requirements in M-Learning Application for KSA University Students

  • Badwelan, Alaa;Bahaddad, Adel A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.145-166
    • /
    • 2021
  • M-learning is one of the most important modern learning environments in developed countries, especially in the context of the COVID-19 pandemic. According to the Ministry of Education policies in Saudi Arabia, gender segregation in education reflects the country's religious values, which are a part of the national policy. Thus, it will help many in the target audience to accept online learning more easily in Saudi society. The literature review indicates the importance to use the UTAUT conceptual framework to study the level of acceptance through adding a new construct to the model which is Mobile Application Quality. The study focuses on the end user's requirements to use M-learning applications. It is conducted with a qualitative method to find out the students' and companies' opinions who working in the M-learning field to determine the requirements for the development of M-learning applications that are compatible with the aspirations of conservative societies.

WEB FRONT-END COMPUTING RELATIONAL DATABASE SYSTEM FOR ITEM-LEVEL PRELIMINARY HIGHWAY COST ESTIMATES

  • Jui-Sheng Chou ;James T. O'Connor ;Khali R. Persad ;Wai Kiong Chong
    • International conference on construction engineering and project management
    • /
    • 2005.10a
    • /
    • pp.509-514
    • /
    • 2005
  • In recent years, use of the web technologies and on-line process has immensely swapped single-user platform practice. This study attempted to develop preliminary cost estimating program by means of Web technologies based on statistical modeling results. A prototype Web-based Preliminary Item-Level Cost Estimating System (WBPILCES) using open source software was developed as an on-line estimating tool in this research. The primary objective is to study the possible flexibility of implementing a centralized information system that will be maintained by the Texas Department of Transportation (TxDOT) IT division. The full-scale deployment of proposed information architecture is expected to seamlessly integrate with legacy database system currently used by TxDOT so as to streamline data storage, cost growth tracking and estimates documentation.

  • PDF

A Design of Secure Communication Architecture Applying Quantum Cryptography

  • Shim, Kyu-Seok;Kim, Yong-Hwan;Lee, Wonhyuk
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.spc
    • /
    • pp.123-134
    • /
    • 2022
  • Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short time. Therefore, research on new cryptography systems is actively being conducted. The most powerful cryptography systems are quantum key distribution (QKD) and post quantum cryptograph (PQC) systems; in this study, a network based on both QKD and PQC is proposed, along with a quantum key management system (QKMS) and a Q-controller to efficiently operate the network. The proposed quantum cryptography communication network uses QKD as its backbone, and replaces QKD with PQC at the user end to overcome the shortcomings of QKD. This paper presents the functional requirements of QKMS and Q-Controller, which can be utilized to perform efficient network resource management.

Role Based Smart Health Service Access Control in F2C environment (F2C 환경에서 역할 기반 스마트 헬스 서비스 접근 제어)

  • Mi Sun Kim;Kyung Woo Park;Jae Hyun Seo
    • Smart Media Journal
    • /
    • v.12 no.7
    • /
    • pp.27-42
    • /
    • 2023
  • The development of cloud services and IoT technology has radically changed the cloud environment, and has evolved into a new concept called fog computing and F2C (fog-to-cloud). However, as heterogeneous cloud/fog layers are integrated, problems of access control and security management for end users and edge devices may occur. In this paper, an F2C-based IoT smart health monitoring system architecture was designed to operate a medical information service that can quickly respond to medical emergencies. In addition, a role-based service access control technology was proposed to enhance the security of user's personal health information and sensor information during service interoperability. Through simulation, it was shown that role-based access control is achieved by sharing role registration and user role token issuance information through blockchain. End users can receive services from the device with the fastest response time, and by performing service access control according to roles, direct access to data can be minimized and security for personal information can be enhanced.

Enabling Performance Intelligence for Application Adaptation in the Future Internet

  • Calyam, Prasad;Sridharan, Munkundan;Xu, Yingxiao;Zhu, Kunpeng;Berryman, Alex;Patali, Rohit;Venkataraman, Aishwarya
    • Journal of Communications and Networks
    • /
    • v.13 no.6
    • /
    • pp.591-601
    • /
    • 2011
  • Today's Internet which provides communication channels with best-effort end-to-end performance is rapidly evolving into an autonomic global computing platform. Achieving autonomicity in the Future Internet will require a performance architecture that (a) allows users to request and own 'slices' of geographically-distributed host and network resources, (b) measures and monitors end-to-end host and network status, (c) enables analysis of the measurements within expert systems, and (d) provides performance intelligence in a timely manner for application adaptations to improve performance and scalability. We describe the requirements and design of one such "Future Internet performance architecture" (FIPA), and present our reference implementation of FIPA called 'OnTimeMeasure.' OnTimeMeasure comprises of several measurement-related services that can interact with each other and with existing measurement frameworks to enable performance intelligence. We also explain our OnTimeMeasure deployment in the global environment for network innovations (GENI) infrastructure collaborative research initiative to build a sliceable Future Internet. Further, we present an applicationad-aptation case study in GENI that uses OnTimeMeasure-enabled performance intelligence in the context of dynamic resource allocation within thin-client based virtual desktop clouds. We show how a virtual desktop cloud provider in the Future Internet can use the performance intelligence to increase cloud scalability, while simultaneously delivering satisfactory user quality-of-experience.

Development and Architecture of Video-to-Images to Enhance User Experience for Video Content Consumption (동영상 콘텐트 소비의 사용자 경험 향상을 위한 V2I(Video to Images) 기술 및 그 구조)

  • Jeon, Kyuyeong;Yang, Jinhong;Kim, Yongrok;Park, Hyojin;Jung, Sungkwan
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.7
    • /
    • pp.326-331
    • /
    • 2016
  • The proportion of video content consumption is growing dramatically but some users avoid it. The reasons are initial time to load, lack of the time to watch video content, and particularly a traffic issues on mobile devices. The proposed Video-to-Images(V2I) technology offers a new user experience to end users through converting video into images without content providers' or users' effort. Using the V2I technology, consumption methods of video content with new type of content by users and the advantages of the new user experience will be introduced. Furthermore, the overall architecture of the V2I will be explained.

A Research on Value Chain Structure on Experience of VR and AR Focused on Means-End Chain Theory on VR and AR (가상현실 미디어 체험이 가치사슬구조형성에 미치는 영향 연구 VR-AR 수단-목적 사슬이론 적용 중심으로)

  • Kweon, Sang Hee
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.49-66
    • /
    • 2018
  • This research explores a value chain structure of VR-AR media including user's perception, uses, and evaluation. The purpose of this research focused on factor analysis and the relationship among user's VR-AR adoption motivations and utilities. This research explores correlation between personal value and using motivation. This study was to identify the value structure of respondent on VR-AR usages based on means-end chain theory. The research used structured APT laddering questions and 251 data was analysed. Through such analysis, category difference by stage and relationship difference were identified and hierarchical value map was compared. There are four different value ladders: first is attributes, functional consequences, psychological consequences, and final value. This study is based on the analysis of the value chain structure factors that affect VR and AR use behavior (attributes, functional benefits, psychological benefits, use value), 'Hierarchical Value Map' between users' The purpose of the model is to construct a model. For this, 'means-end chain theory' was applied to measure the causal relationship between personal value and VR related use behavior. In order to solve this research problem, 135 people were analyzed through the structured questionnaire using the AR and VR content fitness measure and the second APT laddering, and the use of VR-AR : 1) Functional benefits; 2) Psychological benefits; 3) Means to reach value, 4) Objective value chain structure was identified. The results show that VR users tried to smooth the social life through the new virtual reality audiovisual element, the newness of experience, fun, and pleasure through the departure of reality, vividness of experience, and leading fashion. The AR fitness was a game and a new program, and the value of interacting with other people and the value of 'periwinkle' played an important role through the vividness and peripheral interaction of AR, It was an important choice. The important basic values of users' VR and AR selection were correlated with psychological attributes of interaction with others, achievement, happiness and favorable values.