• Title/Summary/Keyword: Server Based Computing

Search Result 670, Processing Time 0.029 seconds

An Efficient Deep Learning Based Image Recognition Service System Using AWS Lambda Serverless Computing Technology (AWS Lambda Serverless Computing 기술을 활용한 효율적인 딥러닝 기반 이미지 인식 서비스 시스템)

  • Lee, Hyunchul;Lee, Sungmin;Kim, Kangseok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.6
    • /
    • pp.177-186
    • /
    • 2020
  • Recent advances in deep learning technology have improved image recognition performance in the field of computer vision, and serverless computing is emerging as the next generation cloud computing technology for event-based cloud application development and services. Attempts to use deep learning and serverless computing technology to increase the number of real-world image recognition services are increasing. Therefore, this paper describes how to develop an efficient deep learning based image recognition service system using serverless computing technology. The proposed system suggests a method that can serve large neural network model to users at low cost by using AWS Lambda Server based on serverless computing. We also show that we can effectively build a serverless computing system that uses a large neural network model by addressing the shortcomings of AWS Lambda Server, cold start time and capacity limitation. Through experiments, we confirmed that the proposed system, using AWS Lambda Serverless Computing technology, is efficient for servicing large neural network models by solving processing time and capacity limitations as well as cost reduction.

Edge Computing Server Deployment Technique for Cloud VR-based Multi-User Metaverse Content (클라우드 VR 기반 다중 사용자 메타버스 콘텐츠를 위한 엣지 컴퓨팅 서버 배치 기법)

  • Kim, Won-Suk
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.8
    • /
    • pp.1090-1100
    • /
    • 2021
  • Recently, as indoor activities increase due to the spread of infectious diseases, the metaverse is attracting attention. Metaverse refers to content in which the virtual world and the real world are closely related, and its representative platform technology is VR(Virtual Reality). However, since VR hardware is difficult to access in terms of cost, the concept of streaming-based cloud VR has emerged. This study proposes a server configuration and deployment method in an edge network when metaverse content involving multiple users operates based on cloud VR. The proposed algorithm deploys the edge server in consideration of the network and computing resources and client location for cloud VR, which requires a high level of computing resources while at the same time is very sensitive to latency. Based on simulation, it is confirmed that the proposed algorithm can effectively reduce the total network traffic load regardless of the number of applications or the number of users through comparison with the existing deployment method.

A Study of Mobile Edge Computing System Architecture for Connected Car Media Services on Highway

  • Lee, Sangyub;Lee, Jaekyu;Cho, Hyeonjoong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5669-5684
    • /
    • 2018
  • The new mobile edge network architecture has been required for an increasing amount of traffic, quality requirements, advanced driver assistance system for autonomous driving and new cloud computing demands on highway. This article proposes a hierarchical cloud computing architecture to enhance performance by using adaptive data load distribution for buses that play the role of edge computing server. A vehicular dynamic cloud is based on wireless architecture including Wireless Local Area Network and Long Term Evolution Advanced communication is used for data transmission between moving buses and cars. The main advantages of the proposed architecture include both a reduction of data loading for top layer cloud server and effective data distribution on traffic jam highway where moving vehicles require video on demand (VOD) services from server. Through the description of real environment based on NS-2 network simulation, we conducted experiments to validate the proposed new architecture. Moreover, we show the feasibility and effectiveness for the connected car media service on highway.

The security requirements suggestion based on cloud computing security threats for server virtualization system (클라우드 컴퓨팅 보안 위협에 기반 한 서버 가상화 시스템 보안 요구 사항 제안)

  • Ma, Seung-Young;Ju, Jung-Ho;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.95-105
    • /
    • 2015
  • In this paper, we propose the security requirements for developing the security functions of server virtualization system. The security requirements are based on the security threats of server virtualization system, and we verified the validity by defending the security threats of server virtualization system. For inducting the security threats damaging server virtualization system from cloud computing security threats, we analyze and suggest the relations between security threats and security issue of server virtualization system.

An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services

  • Irshad, Azeem;Sher, Muhammad;Ahmad, Hafiz Farooq;Alzahrani, Bander A.;Chaudhry, Shehzad Ashraf;Kumar, Rahul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5529-5552
    • /
    • 2016
  • Mobile cloud computing (MCC) has revolutionized the way in which the services can be obtained from the cloud service providers. Manifold increase in the number of mobile devices and subscribers in MCC has further enhanced the need of an efficient and robust authentication solution. Earlier, the subscribers could get cloud-computing services from the cloud service providers only after having consulted the trusted third party. Recently, Tsai and Lo has proposed a multi-server authenticated key agreement solution for MCC based on bilinear pairing, to eliminate the trusted third party for mutual authentication. The scheme has been novel as far as the minimization of trusted party involvement in authenticating the user and service provider, is concerned. However, the Tsai and Lo scheme has been found vulnerable to server spoofing attack (misrepresentation attack), de-synchronization attack and denial-of-service attack, which renders the scheme unsuitable for practical deployment in different wireless mobile access networks. Therefore, we have proposed an improved model based on bilinear pairing, countering the identified threats posed to Tsai and Lo scheme. Besides, the proposed work also demonstrates performance evaluation and formal security analysis.

Implementation of an Application System using Middleware and Context Server for Handling Context-Awareness (상황인식 처리를 위한 미들웨어 및 컨텍스트 서버를 이용한 응용시스템의 구현)

  • Shim Choon-Bo;Tae Bong-Sub;Chang Jae-Woo;Kim Jeong-Ki;Park Seung-Min
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.1
    • /
    • pp.31-42
    • /
    • 2006
  • Context-awareness is a technology to facilitate information acquisition and execution by supporting interoperability between users and devices based on users' context. It is one of the most important technologies in ubiquitous computing. In this paper, we propose a middleware and a context server for dealing with context-awareness in ubiquitous Computing and implement an application system using them. The middleware proposed in our work plays an important role in recognizing a moving node with mobility by using a Bluetooth wireless communication technology as well as in executing an appropriate execution module according to the context acquired from a context server. In addition, the proposed context server functions as a manager that efficiently stores into a database server context information, such as user's current status, physical environment, and resources of a computing system. Finally, our application system implemented in our work one which provides a music playing service based on context information, and it verifies the usefulness of both the middleware and the context server developed in our work.

A Mobile Platform System based on SBC (SBC 기반 차세대 이동형 단말기 개발)

  • Lee, Seung-Ik
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.4
    • /
    • pp.30-36
    • /
    • 2009
  • In this paper, we develop the next generation mobile system based on SBC(Server Based Computing). SBC is one of the popular topic and only one server system is used as multiple personal systems with a terminal, a monitor and a keyboard. The advantages of this system are easy-upgrade, low costs and convenience for each user. But it is difficult to design and manufacture the multimedia streaming system and devices control system for external devices. In this paper, we represent and develops the Mobile system based on SBC and the test performances shows that our system has good performances of multimedia system and security for internet.

Cloud and Fog Computing Amalgamation for Data Agitation and Guard Intensification in Health Care Applications

  • L. Arulmozhiselvan;E. Uma
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.685-703
    • /
    • 2024
  • Cloud computing provides each consumer with a large-scale computing tool. Different Cyber Attacks can potentially target cloud computing systems, as most cloud computing systems offer services to many people who are not known to be trustworthy. Therefore, to protect that Virtual Machine from threats, a cloud computing system must incorporate some security monitoring framework. There is a tradeoff between the security level of the security system and the performance of the system in this scenario. If strong security is needed, then the service of stronger security using more rules or patterns is provided, since it needs much more computing resources. A new way of security system is introduced in this work in cloud environments to the VM on account of resources allocated to customers are ease. The main spike of Fog computing is part of the cloud server's work in the ongoing study tells the step-by-step cloud server to change the tremendous measurement of information because the endeavor apps are relocated to the cloud to keep the framework cost. The cloud server is devouring and changing a huge measure of information step by step to reduce complications. The Medical Data Health-Care (MDHC) records are stored in Cloud datacenters and Fog layer based on the guard intensity and the key is provoked for ingress the file. The monitoring center sustains the Activity Log, Risk Table, and Health Records. Cloud computing and Fog computing were combined in this paper to review data movement and safe information about MDHC.

Design & Implementation of Thin-Client Architecture using Server Based Computing (서버 기반 컴퓨팅을 활용한 썬-클라이언트 아키텍쳐 설계 및 구현)

  • Song, Min-Gyu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.5
    • /
    • pp.149-157
    • /
    • 2008
  • In the field of computing service, there is a copernican revolution indebted to development of network & computer technology. Computer system, which is set to mainframe in the 1960's, is advancing torwards to the paradigm of server based computing, so-called thin-client. In thin-client computing, network is the platform which is responsible for transfer of application, so that client execute application installed on server. It is also possible that each system share the computing resource connected with network. In this parer, we suggest component & distributed computing technology as a measn for the implementation of thin-client architecture hence, make the best use of COM(Component Object Model and PYRO(PYthon Remote Objects). We talk about the concept and mechanism of thin-client at the beginning, and propose the design of network architecture for the implementation thin-client.

  • PDF

Study on Education Content Delivery System in Hybrid P2P based Computing Environment (혼합형 P2P 기반 컴퓨팅환경에서의 교육 컨텐츠 전송 시스템에 대한 연구)

  • Kim, Jin-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.658-661
    • /
    • 2005
  • Internet-based client/server architecture of Contents Delivery System suffers from frequent disconnections and security treats caused by dependency of the server or overload. But, We reached the limit to the increase of the server because a contents quality enhance and Internet user explosively increase. Therefore, a P2P based computing methods are used for sloving these issues. In this paper, We implement and design the Education Content Delivery System for cyber education system using idle Computing Power in P2P computing to share computing resources. We implement not only Internet infrastructure but also satellite infrastructure system, and designed to transfer real-time or non real-time contents.

  • PDF