• 제목/요약/키워드: Limited Resource

검색결과 997건 처리시간 0.036초

상황 정보 온톨로지 기반 추론 검증 도구 (An Inference Verification Tool based on a Context Information Ontology)

  • 김목련;박영호
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제36권6호
    • /
    • pp.488-501
    • /
    • 2009
  • 유비쿼터스 환경에서 모바일 단말기의 제한적인 자원 문제를 해결하기 위해 주변 자원을 실시간으로 공유하는 연구들이 진행되고 있다. 그리고 자원의 공유뿐만 아니라 상황 정보에 기반한 추론을 통해 개인 맞춤형 자원을 추천하는 연구도 활발히 진행되고 있다. 개인 맞춤형 자원 추천을 위하여 사용자의 기본 정보, 자원에 대한 선호도, 공유 대상이 되는 자원의 정보, 단말기의 위치, 시간과 같은 다양한 상황 정보는 효과적으로 공유 및 관리되어야 한다. 또한 신뢰성 있는 자원 추론을 위해 필요한 추론규칙을 검증하는 단계는 매우 중요하다. 이를 위해서 다양한 상황 정보를 구성하여 실제 단말기 상에서 자원 추론규칙이 올바르게 동작하는지 검증해야 하지만 이는 현실적으로 많은 비용과 시간이 필요하다. 따라서 본 논문애서는 이러한 문제점을 해결하기 위하석 추론 검증 도구를 제안한다. 제안하는 추론 검증도구는 편리한 그래픽 사용자 인터페이스를 제공하여 원하는 상황 정보를 쉽게 생성할 수 있고, 실제 단말기를 대신하여 동적인 상황 정보의 변경에 따른 추론을 정확하게 검증한다.

온톨로지 기반의 그리드 자원선택 시스템 (Ontology-based Grid Resource Selection System)

  • 노창현;장성호;김태영;이종식
    • 한국컴퓨터정보학회논문지
    • /
    • 제13권3호
    • /
    • pp.169-177
    • /
    • 2008
  • 그리드 컴퓨팅 환경에서 컴퓨팅 자원은 매우 다양한 네트워크와 시스템으로 구성되어 있다. 이기종의 환경에서 기존의 자원선택 기법으로 사용자가 원하는 자원을 검색 및 선택하는 것은 자원정보의 저장 구조상 한계가 있다. 본 논문은 사용자의 요구사항과 데이터 특성에 맞는 자원을 선택하기 위해 그리드 자원을 온톨로지로 구축하고, SWRL을 이용하여 정의한 규칙을 바탕으로 추론 엔진을 거쳐서 자원을 선택 및 제공하는 온톨로지 기반의 그리드 자원선택시스템을 제안한다. 실험 결과는 본 논문에서 제안한 온톨로지 기반의 그리드 자원선택 시스템이 기존 그리드 자원선택 시스템인 Condor-G와 Nimrod-G 보다 더 높은 작업 처리율 및 자원 이용률과 적은 작업 손실 및 처리 시간을 보임으로써 그리드 자원선택을 지능적이며 능동적으로 할 수 있고, 자원 이용에 더 효과적이라는 사실을 증명한다.

  • PDF

Asymmetric Impact of IS Quality on User Satisfaction: Development of Resource Allocation Strategy of e-Government in Agriculture

  • Park, Heun Dong;Kim, Haneul
    • Agribusiness and Information Management
    • /
    • 제5권1호
    • /
    • pp.42-54
    • /
    • 2013
  • Information System (IS) Success Model proposed by DeLone and McLean is applied as a successful operation tool of information system, with its basic assumption of symmetric relationship between independent variables and dependent variables of the structural equation modeling. However, because previous studies have proved asymmetry of quality factors' influence structure on dependent variable by applying three-factor analysis, this study examined asymmetry of impact structure of quality factors introduced in IS Success Model on user satisfaction. Also the study applies structure equation modeling (SEM), three-factor analysis and importance and performance analysis (IPA) to develop resource allocation strategy for IS success. The study is able to provide IS practitioners with strategic implications for allocating and managing limited resources more effectively.

  • PDF

RESOURCE ORIENTED ARCHITECTURE FOR MUTIMEDIA SENSOR NETWORKS IWAIT2009

  • Iwatani, Hiroshi;Nakatsuka, Masayuki;Takayanagi, Yutaro;Katto, Jiro
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송공학회 2009년도 IWAIT
    • /
    • pp.456-459
    • /
    • 2009
  • Sensor network has been a hot research topic for the past decade and has moved its phase into using multimedia sensors such as cameras and microphones [1]. Combining many types of sensor data will lead to more accurate and precise information of the environment. However, the use of sensor network data is still limited to closed circumstances. Thus, in this paper, we propose a web-service based framework to deploy multimedia sensor networks. In order to unify different types of sensor data and also to support heterogeneous client applications, we used ROA (Resource Oriented Architecture [2]).

  • PDF

An Offloading Strategy for Multi-User Energy Consumption Optimization in Multi-MEC Scene

  • Li, Zhi;Zhu, Qi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권10호
    • /
    • pp.4025-4041
    • /
    • 2020
  • Mobile edge computing (MEC) is capable of providing services to smart devices nearby through radio access networks and thus improving service experience of users. In this paper, an offloading strategy for the joint optimization of computing and communication resources in multi-user and multi-MEC overlapping scene was proposed. In addition, under the condition that wireless transmission resources and MEC computing resources were limited and task completion delay was within the maximum tolerance time, the optimization problem of minimizing energy consumption of all users was created, which was then further divided into two subproblems, i.e. offloading strategy and resource allocation. These two subproblems were then solved by the game theory and Lagrangian function to obtain the optimal task offloading strategy and resource allocation plan, and the Nash equilibrium of user offloading strategy games and convex optimization of resource allocation were proved. The simulation results showed that the proposed algorithm could effectively reduce the energy consumption of users.

Distributed Resource Partitioning Scheme for Intercell Interference in Multicellular Networks

  • Song, Jae-Su;Lee, Seung-Hwan
    • Journal of electromagnetic engineering and science
    • /
    • 제15권1호
    • /
    • pp.14-19
    • /
    • 2015
  • In multicellular wireless networks, intercell interference limits system performance, especially cell edge user performance. One promising approach to solve this problem is the intercell interference coordination (ICIC) scheme. In this paper, we propose a new ICIC scheme based on a resource partitioning approach to enhance cell edge user performance in a wireless multicellular system. The most important feature of the proposed scheme is that the algorithm is performed at each base station in a distributed manner and therefore minimizes the required information exchange between neighboring base stations. The proposed scheme has benefits in a practical environment where the traffic load distribution is not uniform among base stations and the backhaul capacity between the base stations is limited.

SDN 플로우 테이블 제한에 따른 리소스 어택 (Resource Attack Based On Flow Table Limitation in SDN)

  • 뉴엔 트리 투안 힙;김경백
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2014년도 추계학술발표대회
    • /
    • pp.215-217
    • /
    • 2014
  • In Software Defined Network (SDN), data plane and control plane are decoupled. Dummy switches on the data plane simply forward packet based on the flow entries that are stored in its flow table. The flow entries are generated by a centralized controller that acts as a brain of the network. However, the size of flow table is limited and it can conduct a security issue related to Distributed Denial of Service (DDoS). Especially, it related to resource attack that consumes all flow table resource and consumes controller resources. In this paper, we will analyze the impact of flow table limitation to the controller. Then we propose an approach that is called Flow Table Management to handle flow table limitation.

A PROACTIVE APPROACH FOR RESOURCE CONSTRAINED SCHEDULING OF MULTIPLE PROJECTS

  • Balasubramanian Kanagasabapathi;Kuppusamy Ananthanarayanan
    • 국제학술발표논문집
    • /
    • The 1th International Conference on Construction Engineering and Project Management
    • /
    • pp.744-747
    • /
    • 2005
  • The AEC (Architecture/Engineering/Construction) industry is facing a competitive world after it entered into the 21st century. Due to improper planning and scheduling, the construction projects face severe delays in completion. Most of the present day construction organisations operate in multiple project environments where more than one projects are to be managed simultaneously. But the advantages of planning and scheduling as multiple projects have not been utilized by these organisations. Change in multi-project planning and scheduling is inevitable and often frequent, therefore the traditional planning and scheduling approaches are no more feasible in scheduling multiple construction projects. The traditional scheduling tools like CPM and PERT do not offer any help in scheduling in a resource-constrained environment. This necessitated a detailed study to model the environment realistically and to make the allocation of limited resources flexible and efficient. This paper delineates about the proactive model which will help the project managers for scheduling the multiple construction projects.

  • PDF

IMT-2000 이동통신시스템의 보안기능 요구 분석 및 설계 (Analysis and Design of Security Feature in IMT-2000)

  • 권수근;신경철;김진업;김대식
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 추계종합학술대회 논문집(1)
    • /
    • pp.469-472
    • /
    • 2000
  • Security-related issues in mobile communications are increasing. The security requirements of mobile communications for the mobile users include authentication of the mobile user, the data confidentiality, the data confidentiality and the location privacy of mobile user. These services require security features compatible with the wireline networks. However, wireless networks have many restrictions compare to wireline networks such as the limited computational capability of mobile equipment and limited resource(bandwidth) between a mobile user and a fixed network. So, security features for IMT-2000 are designed to meet the limited capacity. In this paper, we analyze the required security features and mechanism, and design network access security feature effective for IMT-2000 Systems. The design includes security functions allocation to each system. Finally, discuss the computational power of each system based on at]coated functions to it

  • PDF

Edge Computing Task Offloading of Internet of Vehicles Based on Improved MADDPG Algorithm

  • Ziyang Jin;Yijun Wang;Jingying Lv
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권2호
    • /
    • pp.327-347
    • /
    • 2024
  • Edge computing is frequently employed in the Internet of Vehicles, although the computation and communication capabilities of roadside units with edge servers are limited. As a result, to perform distributed machine learning on resource-limited MEC systems, resources have to be allocated sensibly. This paper presents an Improved MADDPG algorithm to overcome the current IoV concerns of high delay and limited offloading utility. Firstly, we employ the MADDPG algorithm for task offloading. Secondly, the edge server aggregates the updated model and modifies the aggregation model parameters to achieve optimal policy learning. Finally, the new approach is contrasted with current reinforcement learning techniques. The simulation results show that compared with MADDPG and MAA2C algorithms, our algorithm improves offloading utility by 2% and 9%, and reduces delay by 29.6%.