• Title/Summary/Keyword: cluster management

Search Result 1,337, Processing Time 0.024 seconds

Security Improvement of ID-based Multiple Key Management Scheme for t Scalable Ad Hoc Networks

  • Park, Yo-Han;Park, Young-Ho;Moon, Sang-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.13-18
    • /
    • 2011
  • Security supports are a significant factor in mobile ad hoc networks. Especially in dynamic topologies, considering cluster, key management is essential to provide a secure system. Recently, Li-Liu proposed iD-based multiple key management scheme for cluster-based ad hoc networks. However, we found the security weakness of their scheme. In this paper, we analyze the security of Li-Liu's scheme and show that master secret key and fragment of the master secret key can be revealed to compromised CHs and nodes. Furthermore, we propose a solution to improve the scheme against disclosure of the share key and the master secret key even though system parameters are opened to compromised nodes and modify the Li-Liu's scheme fitted for a scalable networks. The improved IMKM scheme could be usefully applied in dynamic cluster-based MANETs such as the military battlefields, mobile marketplace and VANETs.

A Novel Node Management in Hadoop Cluster by using DNA

  • Balaraju. J;PVRD. Prasada Rao
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.134-140
    • /
    • 2023
  • The distributed system is playing a vital role in storing and processing big data and data generation is speedily increasing from various sources every second. Hadoop has a scalable, and efficient distributed system supporting commodity hardware by combining different networks in the topographical locality. Node support in the Hadoop cluster is rapidly increasing in different versions which are facing difficulty to manage clusters. Hadoop does not provide Node management, adding and deletion node futures. Node identification in a cluster completely depends on DHCP servers which managing IP addresses, hostname based on the physical address (MAC) address of each Node. There is a scope to the hacker to theft the data using IP or Hostname and creating a disturbance in a distributed system by adding a malicious node, assigning duplicate IP. This paper proposing novel node management for the distributed system using DNA hiding and generating a unique key using a unique physical address (MAC) of each node and hostname. The proposed mechanism is providing better node management for the Hadoop cluster providing adding and deletion node mechanism by using limited computations and providing better node security from hackers. The main target of this paper is to propose an algorithm to implement Node information hiding in DNA sequences to increase and provide security to the node from hackers.

An analysis of the Factors of Moving in and Activation Strategies for Incheon Cold-Chain Cluster using LNG cold energy (LNG 냉열을 활용한 인천항 냉동·냉장 클러스터 입주요인 분석 및 활성화 방안 연구)

  • Ahn, kil-Seob;Oh, Jae-Gyun;Yang, Tae-Hyeon;Yeo, Gi-Tae
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.101-111
    • /
    • 2019
  • The construction of a "cold-chain cluster," which is a complex of cold-storage warehouses is emerging as an issue in the logistics industry. The Incheon Port Authority, in partnership with Korea Gas Corporation, is carrying out a project to build a cold-storage cluster using cold energy generated in the Songdo LNG receiving terminal. This study proposes a method of activating the cold-storage cluster using the CFPR methodology. An analysis of major factors showed that the most important factor was stability and profitability, which scored 0.281. For sub-factors, sustainable trade volume was the highest in importance, followed by rent level, the sustainability of LNG cold energy utilization technology, competition with general cold-storage warehouses, and exclusion of duplicate investments in facilities. For the future study, the evaluation of complex of cold-storage warehouses using major factors drawn out from this study is needed.

The Clustered Patterns of Engagement in MOOCs and Their Effects on Teaching Presence and Learning Persistence

  • Kim, Hannah;Lee, Jeongmin;Jung, Yeonji
    • International Journal of Contents
    • /
    • v.16 no.4
    • /
    • pp.39-49
    • /
    • 2020
  • The goal of this research was to understand the patterns of multidimensional engagement in MOOCs. An email with an online survey link was sent to enrollees in an MOOC course. The survey included 35 questions asking about engagement, teaching presence, and learning persistence. The items were validated in the literature, revised for the MOOC setting, reviewed by four professionals in the field of educational technology, and used in the study. A heterogeneous group of 170 individuals gathered through convenience sampling participated in the study. With cluster analysis of the engagement data, three groups were identified: Cluster1, 2, and 3. Cluster 1 scored high on behavioral, emotional, and cognitive engagement. Cluster 2 scored high on behavioral aspects but low on emotional and cognitive engagement. Cluster 3 scored low on behavioral and cognitive engagement but high on emotional aspects. The study addressed cluster-specific learner characteristics and differences in perceived teaching presence and learning persistence. Design strategies pertaining to each cluster were further discussed. These strategies may guide instructors and practitioners in the design and management of MOOCs and should be further validated through future studies.

Integrated Linux Cluster System Administration Tool (리눅스 클러스터 시스템 통합 관리 도구)

  • 김은회;김지연;박용관;권성주;최재영
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.6
    • /
    • pp.639-646
    • /
    • 2002
  • In this paper, we discuss the system configuration and the design issues of CATS-i, a set of installation and administration tools for Linux cluster systems. CATS-i enables users to manage cluster systems easily, quickly, and safety. It integrates many functions, ranging from installing operating systems and applications to real-time monitoring and management of various important resources. In addition, batch job submission and management are included. These functions support a single system image. Finally, a powerful graphic user interface based on Java lets users quickly understand the cluster status and conveniently use the CATS-i on the Web.

A Study on the Development of Industrial Clusters in the International Science and Business Belt through the Industrial Clustering Analysis (산업 클러스터링 분석을 통한 국제과학비즈니스벨트의 클러스터 발전 방향 연구)

  • Jung, Hye-Jin;Og, Joo-Young;Kim, Byung-Keun;Ji, Il-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.2
    • /
    • pp.370-379
    • /
    • 2018
  • The Korean government announced plans for the International Science Business Belt as a spatial area for promoting the linkage between scientific knowledge and commercialization in 2009. R&D and entrepreneurial activities are essential for the success of the International Science Business Belt. In particular, prioritizing the types of businesses is critical at the cluster establishment stage in that this largely affects the features and development of clusters comprising the International Science Business Belt. This research aims to predict the entry and growth of firms that specialize in four industrial clusters, including Big Science Cluster, Frontier Cluster, ICT Cluster, and Bio-Healthcare Cluster. For this purpose, we employ the Swann & Prevezer's industrial clustering model to identify sectors that affect the establishment and growth of industrial clusters in the International Science Business Belt, focusing on ICT, Bio-Healthcare and Frontier clusters. Data was collected from the 2014 Korean Innovation Survey (KIS) and University Alimi for the ICT cluster, 2014 National Bio Industry Survey and University Alimi for the Bio-Healthcare Cluster, and the 2015 National Nano Convergent Industry Survey and Annual Report of Nano Technology for the Frontier cluster. Empirical results show that the ICT service sector, bio process/equipment sector, and Nano electronic sector promote clustering in other sectors. Based on the analysis results, we discuss several policy implications and strategies that can attract relevant firms for the development of industrial clusters.

Ergonomic Design of the Gauge Cluster Display for Commercial Trucks

  • Kim, Taehun;Park, Jaekyu;Choe, Jaeho;Jung, Eui S.
    • Journal of the Ergonomics Society of Korea
    • /
    • v.34 no.3
    • /
    • pp.247-264
    • /
    • 2015
  • Objective: The purpose of this study is to determine the priority of information presentation and the effective menu type to be placed in the center of a gauge cluster display for commercial trucks and to present a set of ergonomic designs for the gauge cluster display. Background: An effective ergonomic design is specifically needed for the development of the gauge cluster display for the commercial trucks, because more diverse and heavier information is delivered to truck drivers, compared to the information to passenger car drivers. Method: First, all the information that must be shown on the commercial truck display was collected. Then, the severity, frequency of use, and display design parameters were evaluated for those information by commercial truck drivers. Next, an analysis on the information attributes and the heuristic evaluation utilizing the display design principles were carried out. According to the results, a design alternative of the main screen to be displayed was constructed by priority. A comparative analysis between the alternative and existing main screens was also conducted to see the efficacy of the designs. Lastly, we conducted an experiment for the selection of menu type. The experiment was conducted using the driving simulator with an eye-tracking device. The independent variables were four types of the menu reflecting the commercial truck characteristics such as grid type, icon type, list type, and flow type. We measured preference, total execution time, the total duration of fixation on the gauge cluster area, and the total number of fixation on the gauge cluster area as dependent variables. Results: Four types of driver convenience information and six types of driver assistance information were selected as the information to be placed primarily on the main screen of the gauge cluster. The Grid type was the most effective among the menu types. Conclusion: In this study, the information that appears on the main screen of the display, the division of the display and the design of the menu type for commercial truck drivers were suggested. Application: This study is expected to be utilized as guidelines on the ergonomic design of a gauge cluster display for commercial trucks.

Design of customized product recommendation model on correlation analysis when using electronic commerce (전자상거래 이용시 연관성 분석을 통한 맞춤형 상품추천 모델 설계)

  • Yang, MingFei;Park, Kiyong;Choi, Sang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.3
    • /
    • pp.203-216
    • /
    • 2022
  • In the recent business environment, purchase patterns are changing around the influence of COVID-19 and the online market. This study analyzed cluster and correlation analysis based on purchase and product information. The cluster analysis of new methods was attempted by creating customer, product, and cross-bonding clusters. The cross-bonding cluster analysis was performed based on the results of each cluster analysis. As a result of the correlation analysis, it was analyzed that more association rules were derived from a cross-bonding cluster, and the overlap rate was less. The cross-bonding cluster was found to be highly efficient. The cross-bonding cluster is the most suitable model for recommending products according to customer needs. The cross-bonding cluster model can save time and provide useful information to consumers. It is expected to bring positive effects such as increasing sales for the company.

A Preventive Maintenance Scheduling Model of the Cluster Tool (클러스터 툴의 예방유지보수 스케줄링 모형)

  • Lee, Hyun;Park, You-Jin;Hur, Sun
    • IE interfaces
    • /
    • v.25 no.1
    • /
    • pp.127-133
    • /
    • 2012
  • This paper considers the preventive maintenance scheduling problem of the cluster tool which is one of the most important manufacturing equipments in the next-generation semiconductor production environment. We define a random process that expresses the successive amount of chemicals accumulating inside the tool. Based on the renewal theory, we find the expected value and probability distribution of the time that the amount of accumulated chemicals exceeds a predetermined level. For a given probability that the accumulated chemicals exceeds the predetermined level we present a method to obtain the number of chamber operations to perform the preventive maintenance of that chamber. In addition, a method to get the preventive maintenance schedule for the whole cluster tool is presented. A numerical example is provided to illustrate our method.

A Study on 3-tiers Authentication Scheme for Improving the Confidence Verification of Nodes in the MANET (MANET에서 노드들의 신뢰 검증 향상을 위한 3-tiers 인증 기법 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.87-93
    • /
    • 2013
  • MANET has the advantage of having the flexibility to build easily a network in a difficult situation that builds a wired network. But, data transmission errors by movement of nodes and eavesdropping by wireless communications have become a problem of security. Authentication service is the most essential in order to overcome these problems and operate network stably. In this paper, we propose 3-tiers authentication structure to exclude of malicious node and operate stable network through more systematic and thorough node authentication. After network is composed into a cluster, cluster head which play CA role is elected. Among these, the highest-CA is elected. The highest-CA receives certificates to cluster head and the cluster head evaluates trust value of their member nodes. Authentication technique which issues member node key is used. We compared PSS and experimented to evaluate performance of proposed scheme in this paper and efficiency of the proposed technique through experience was confirmed.