• 제목/요약/키워드: Hardware Resources

Search Result 442, Processing Time 0.028 seconds

Dynamic Task Scheduling Via Policy Iteration Scheduling Approach for Cloud Computing

  • Hu, Bin;Xie, Ning;Zhao, Tingting;Zhang, Xiaotong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1265-1278
    • /
    • 2017
  • Dynamic task scheduling is one of the most popular research topics in the cloud computing field. The cloud scheduler dynamically provides VM resources to variable cloud tasks with different scheduling strategies in cloud computing. In this study, we utilized a valid model to describe the dynamic changes of both computing facilities (such as hardware updating) and request task queuing. We built a novel approach called Policy Iteration Scheduling (PIS) to globally optimize the independent task scheduling scheme and minimize the total execution time of priority tasks. We performed experiments with randomly generated cloud task sets and varied the performance of VM resources using Poisson distributions. The results show that PIS outperforms other popular schedulers in a typical cloud computing environment.

Analysis of Trends in Hyper-connected Virtual Infrastructure Management Technology (초연결 가상 인프라 관리 기술 동향 분석)

  • Shim, J.C.;Park, P.K.;Ryu, H.Y.;Kim, T.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.4
    • /
    • pp.135-148
    • /
    • 2020
  • Virtualisation in cloud computing is vital for maintaining maximum resource utilization and easy access to operation and storage management of components. Platform virtualisation technology has the potential to be easily implemented with the support of scalability and security, which are the most important components for cloud-based services. Virtual resources must be allocated to a centralized pool called the cloud, and it is considered as cloud computing only when the virtual resources are orchestrated through management and automation software. Therefore, research and development on the latest technology for such a virtualisation platform provides both academia and industry the scope to deploy the fastest and most reliable technology in limited hardware resource. In this research, we reviewed and compared the popular current technologies for network and service management and automation technology.

The e-Science collaborative research environment using the Cactus and the GridSphere (Cactus와 GridSphere를 이용한 e-Science 협업 연구 환경)

  • Na Jeoung-Su;Cho Kum Won;Song Young Duck;Kim Young Gyun;Ko Soon-Heum
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2005.04a
    • /
    • pp.35-40
    • /
    • 2005
  • Up to recently, with the improvement of a computer power and high speed of network technology, advanced countries have researched a construction of the e-Science environment. As a major application part, a construction for environment of CFD, also, have studied together. During the research, people realize that not sharing hardware but also appropriate software development is really important to realize the environment. This paper describes about a construction of a collaborative research environment in the KISTI: Clients can connect to the computing resources through the web portal, run the Cactus simulation.: According to the computing resources, the simulation can migrate to some site to find better computing power.: Result of the calculation visualize at the web portal directly so that researchers of remote site can be share and analyze the result collaborative ways.

  • PDF

Design of Finite Field Multiplier for Elliptic Curve Cryptosystems (타원곡선 암호화 시스템을 위한 유한필드 곱셈기의 설계)

  • Lee, Wook;Lee, Sang-Seol
    • Proceedings of the KIEE Conference
    • /
    • 2001.07d
    • /
    • pp.2576-2578
    • /
    • 2001
  • Elliptic curve cryptosystems based on discrete logarithm problem in the group of points of an elliptic curve defined over a finite field. The discrete logarithm in an elliptic curve group appears to be more difficult than discrete logarithm problem in other groups while using the relatively small key size. An implementation of elliptic curve cryptosystems needs finite field arithmetic computation. Hence finite field arithmetic modules must require less hardware resources to archive high performance computation. In this paper, a new architecture of finite field multiplier using conversion scheme of normal basis representation into polynomial basis representation is discussed. Proposed architecture provides less resources and lower complexity than conventional bit serial multiplier using normal basis representation. This architecture has synthesized using synopsys FPGA express successfully.

  • PDF

A Study on the Model of Information Resource Management Architecture for Government and Public Organizations (국가공공기관 정보자원관리를 위한 기본구조 모델에 관한 사례 연구)

  • Kwon, Moon-Taek
    • Asia pacific journal of information systems
    • /
    • v.10 no.4
    • /
    • pp.77-100
    • /
    • 2000
  • Information technology(IT) has become the fourth major resource available to executives to shape and operate government and public organizations. Government and public organizations have managed the other three major resources for years : people, money, and machine. But today IT accounts for more than 10 % of the budget spent in the Korean government and public organizations. From an information resource management point of view, therefore, data and information, hardware and software, telecommunications networks, information systems personnel and other factors are valuable resources that should be managed for the benefit of the entire organization. This paper studied on the model of information resource management(IRM) architecture for government and public organizations and suggested a new generic model for IRM. The model is consisted of four basic architectures and each architecture includes several factors that should be managed for the benefit of the entire government and public organizations.

  • PDF

Edge Computing Server Deployment Technique for Cloud VR-based Multi-User Metaverse Content (클라우드 VR 기반 다중 사용자 메타버스 콘텐츠를 위한 엣지 컴퓨팅 서버 배치 기법)

  • Kim, Won-Suk
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.8
    • /
    • pp.1090-1100
    • /
    • 2021
  • Recently, as indoor activities increase due to the spread of infectious diseases, the metaverse is attracting attention. Metaverse refers to content in which the virtual world and the real world are closely related, and its representative platform technology is VR(Virtual Reality). However, since VR hardware is difficult to access in terms of cost, the concept of streaming-based cloud VR has emerged. This study proposes a server configuration and deployment method in an edge network when metaverse content involving multiple users operates based on cloud VR. The proposed algorithm deploys the edge server in consideration of the network and computing resources and client location for cloud VR, which requires a high level of computing resources while at the same time is very sensitive to latency. Based on simulation, it is confirmed that the proposed algorithm can effectively reduce the total network traffic load regardless of the number of applications or the number of users through comparison with the existing deployment method.

FPGA Implementation of an Artificial Intelligence Signal Recognition System

  • Rana, Amrita;Kim, Kyung Ki
    • Journal of Sensor Science and Technology
    • /
    • v.31 no.1
    • /
    • pp.16-23
    • /
    • 2022
  • Cardiac disease is the most common cause of death worldwide. Therefore, detection and classification of electrocardiogram (ECG) signals are crucial to extend life expectancy. In this study, we aimed to implement an artificial intelligence signal recognition system in field programmable gate array (FPGA), which can recognize patterns of bio-signals such as ECG in edge devices that require batteries. Despite the increment in classification accuracy, deep learning models require exorbitant computational resources and power, which makes the mapping of deep neural networks slow and implementation on wearable devices challenging. To overcome these limitations, spiking neural networks (SNNs) have been applied. SNNs are biologically inspired, event-driven neural networks that compute and transfer information using discrete spikes, which require fewer operations and less complex hardware resources. Thus, they are more energy-efficient compared to other artificial neural networks algorithms.

Accelerating 2D DCT in Multi-core and Many-core Environments (멀티코어와 매니코어 환경에서의 2 차원 DCT 가속)

  • Hong, Jin-Gun;Jung, Sung-Wook;Kim, Cheong-Ghil;Burgstaller, Bernd
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.250-253
    • /
    • 2011
  • Chip manufacture nowadays turned their attention from accelerating uniprocessors to integrating multiple cores on a chip. Moreover desktop graphic hardware is now starting to support general purpose computation. Desktop users are able to use multi-core CPU and GPU as a high performance computing resources these days. However exploiting parallel computing resources are still challenging because of lack of higher programming abstraction for parallel programming. The 2-dimensional discrete cosine transform (2D-DCT) algorithms are most computational intensive part of JPEG encoding. There are many fast 2D-DCT algorithms already studied. We implemented several algorithms and estimated its runtime on multi-core CPU and GPU environments. Experiments show that data parallelism can be fully exploited on CPU and GPU architecture. We expect parallelized DCT bring performance benefit towards its applications such as JPEG and MPEG.

The method of securing water supply resources of existing dam by using Blue dam (Blue dam을 활용한 기존 댐 시설물 상수도 원수 추가 확보 방안)

  • Choo, Tai-Ho;Yoon, Hyeon-Cheol;Yun, Gwan-Seon;Kwon, Yong-Been;Shim, Su-Yong;Chae, Soo-Kwon
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.29 no.2
    • /
    • pp.243-249
    • /
    • 2015
  • To improve stability of the water resources that were seriously affected by climate change and various environmental effects and to supply the clean water always, continuous efforts are essential. Provision of measures with respect of hardware is basically essential to improve the water resources stability due to the topographic characteristic in Korea. However, building a new dam becomes gradually very difficult because of a hardship in selecting right places, opposition forces such as environment and local residents, negative publicity for large civil engineering projects, and so on. The present study, therefore, proposes the Blue dam as an alternative for securing the water resources of a new concept considering domestic conditions. To evaluate the effect of the Blue dam, the Hec-ResSim model is used and the probabilistic discharge flow rate is applied. As a result, when Dam Yeongcheon is applied as a study area, securing water resources of 14 million tons are predicted be secured and the flood control of 15.4 million tons is expected, in comparison with operation of the existing dam only. Consequently, Blue dams are supposed to carry out the function of securing water resources, controling flood, maintaining eco-environmental instream flow, generating hydroelectric power, and providing spaces for recreational activities.

Light Weight Korean Morphological Analysis Using Left-longest-match-preference model and Hidden Markov Model (좌최장일치법과 HMM을 결합한 경량화된 한국어 형태소 분석)

  • Kang, Sangwoo;Yang, Jaechul;Seo, Jungyun
    • Korean Journal of Cognitive Science
    • /
    • v.24 no.2
    • /
    • pp.95-109
    • /
    • 2013
  • With the rapid evolution of the personal device environment, the demand for natural language applications is increasing. This paper proposes a morpheme segmentation and part-of-speech tagging model, which provides the first step module of natural language processing for many languages; the model is designed for mobile devices with limited hardware resources. To reduce the number of morpheme candidates in morphological analysis, the proposed model uses a method that adds highly possible morpheme candidates to the original outputs of a conventional left-longest-match-preference method. To reduce the computational cost and memory usage, the proposed model uses a method that simplifies the process of calculating the observation probability of a word consisting of one or more morphemes in a conventional hidden Markov model.

  • PDF