• 제목/요약/키워드: computing

검색결과 14,937건 처리시간 0.045초

Edge Computing의 성능 분석을 위한 SDN 테스트베드 구축 방안 (Implementation of SDN testbed for performance analysis of Edge Computing)

  • 임환희;이병준;김경태;윤희용
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2018년도 제57차 동계학술대회논문집 26권1호
    • /
    • pp.5-6
    • /
    • 2018
  • Edge Computing의 성능 분석을 위해 SDN 테스트 베드를 구축하는 방안을 제안한다. Edge Computing 환경에서 연구한 알고리즘들을 실증적 성능 테스트하기 위해 테스트베드를 구축하였다. Raspberry-Pi를 이용해 SDN Switch를 구현하였고, Edge단의 노드는 테스트를 위해 노트북을 연결해 인터넷이 되는지 확인하였다. Edge Computing 환경은 수 많은 노드를 연결해 테스트해야 하며 따라서 SDN 환경이 적절하다. 본 논문에서는 SDN에 대해서 알아보고 Raspberry-Pi를 이용한 테스트 베드 구축 방안에 대해 소개하고자 한다.

  • PDF

Educational Objectives in Computing Education: A Comparative Analysis

  • An, Sangjin;Lee, Youngjun
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권1호
    • /
    • pp.181-189
    • /
    • 2016
  • This study examined three elementary school computing curriculum - the CSTA K-12 computer science standards, the computing programme of the national curriculum in England, and the 2015 national curriculum in Korea - focusing on the educational objectives with the perspective of the revision of Bloom's Taxonomy of Educational Objectives. The CSTA K-12 computer science standards mainly addressed applying procedural knowledge and using digital technology is the main theme. The computing programme in England concentrated on understanding factual and conceptual knowledge of computer science, such as algorithms. The 2015 national curriculum also addressed applying procedural knowledge, but the main focus is making softwares and robots. The findings of this comparative analysis suggest that it is needed to set up concrete educational objectives for lower grade and make them related to the secondary education to make more coherent elementary-level learning objectives. And elementary-level computing learning objectives are needed to be organized with the perspective of knowledge and cognitive process level.

Context-aware Multimedia Framework based on Software Agent Platforms

  • Hendry;Seongjoon Pak;Yumi Sohn;Kim, Munchurl
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2003년도 가을 학술발표논문집 Vol.30 No.2 (2)
    • /
    • pp.253-255
    • /
    • 2003
  • We address an integrated multimedia framework based on a software agent platform for context-aware multimedia computing. We adopt the FIPA (Foundation for Intelligent Physical Agents) platform which provides agent communications and management mechanisms. In order to express context information, we use MPEG-21 metadata for describing user characteristics and usage environment. We encapsulate such context information as a FIPA message to be delivered between agents. Based on context information, appropriate multimedia content delivery becomes possible. We present our system implementation with a use case scenario and show that our proposed framework is effective for context-aware multimedia computing so that personalization of multimedia consumption can be possible.

  • PDF

Enterprise Grid 환경에서의 Integrated Development Environment Grid Portal 구축 제안 (Construction of the Grid Portal for the Integrated Development Environment in Enterprise Grid.)

  • 홍필두;이용우
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2005년도 한국컴퓨터종합학술대회 논문집 Vol.32 No.1 (A)
    • /
    • pp.58-60
    • /
    • 2005
  • 기업의 computing process에서는 기업의 주요업무 및 전략을 분석 정의하여 이것을 computing resource에 실행한다. 이를 위하여, 일반적으로, 여러 개발자들이 공유개발환경을 통하여 프로세스를 개발하고 이를 운영한다. 현재 Enterprise Computing Environment에서는 Grid Computing이 필연적 과제이다. Grid Computing에서, Grid Portal은 통합사용자인터페이스를 제공하여 주는 중요한 요소이다. 그러나, 현재의 대부분의 Grid Portal들은 Job Submit 처리를 중점적으로 구현하는데 주력하고 있기 때문에, 기업 computing process의 중요한 요소인 통합적 개발환경에 대한 지원이 부족하다. 본 연구에서는, 이런 부족한 부분을 개선하여, Enterprise Grid 환경을 위한 통합개발환경의 Grid Portal의 모델을 제안한다.

  • PDF

가상화 기술의 취약점을 이용한 공격 대응에 관한 연구 (A Study against Attack using Virtualization Weakness)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제8권3호
    • /
    • pp.57-64
    • /
    • 2012
  • Computing environment combined with development of internet and IT technology is changing to cloud computing environment. In addition, cloud computing is revitalized more because of propagation of LTE and suggestion of N-screen Service. Virtualization is the point technology for suggest IT resource to service form to users in this cloud computing. This technology combines other system physically or divides one system logically and uses resource efficiently. Many users can be provided application and hardware as needed using this. But, lately various attack using weak point of virtualization technology are increasing rapidly. In this study, we analyze type and weak point of virtualization technology, the point of cloud computing. And we study about function and the position which intrusion detection system has to prepare in order to detect and block attack using this.

A need-awaring multi-agent approach to nomadic community computing for ad hoc need identification and group formation

  • 최근호;권오병
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 2005년도 공동추계학술대회
    • /
    • pp.183-192
    • /
    • 2005
  • Recently, community computing has been proposed for group formation and group decision-making. However, legacy community computing systems do not support group need identification for ad hoc group formation, which would be one of key features of ubiquitous decision support systems and services. Hence, this paper aims to provide a multi-agent based methodology to enable nomadic community computing which supports ad hoc need identification and group formation. Focusing on supporting group decision-making of relatively small sized multiple individual in a community, the methodology copes with the following three characteristics: (1) ad hoc group formation, (2) context-aware group need identification, and (3) using mobile devices working in- and out-doors. NAMA-US, an RFID-based prototype system, has been developed to show the feasibility of the idea proposed in this paper.

  • PDF

Cryptography in the Cloud: Advances and Challenges

  • Boyd, Colin
    • Journal of information and communication convergence engineering
    • /
    • 제11권1호
    • /
    • pp.17-23
    • /
    • 2013
  • Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.

A Survey of Multimodal Systems and Techniques for Motor Learning

  • Tadayon, Ramin;McDaniel, Troy;Panchanathan, Sethuraman
    • Journal of Information Processing Systems
    • /
    • 제13권1호
    • /
    • pp.8-25
    • /
    • 2017
  • This survey paper explores the application of multimodal feedback in automated systems for motor learning. In this paper, we review the findings shown in recent studies in this field using rehabilitation and various motor training scenarios as context. We discuss popular feedback delivery and sensing mechanisms for motion capture and processing in terms of requirements, benefits, and limitations. The selection of modalities is presented via our having reviewed the best-practice approaches for each modality relative to motor task complexity with example implementations in recent work. We summarize the advantages and disadvantages of several approaches for integrating modalities in terms of fusion and frequency of feedback during motor tasks. Finally, we review the limitations of perceptual bandwidth and provide an evaluation of the information transfer for each modality.

GCaaS: A Light-weight Grid Computing Web Application

  • 류사오;우균
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2015년도 춘계학술발표대회
    • /
    • pp.121-124
    • /
    • 2015
  • Recent global and cloud computing render the Internet and Web application to be a paramount field since it is uncomplicated to access and less time and space limitation. On the other hand, a growing number of computations using grid computing techniques indicates the requirements and quantities of large-scale computations are becoming foremost progressively. Therefore, that will be much practicable if there is a Web-based service that could provide Grid computing functions. In this paper, Several similar Web-based cloud and parallel computing systems will be discussed and a model of Web application termed GCaaS which supports grid computing services will be introduced.

The Security Architecture for Secure Cloud Computing Environment

  • Choi, Sang-Yong;Jeong, Kimoon
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권12호
    • /
    • pp.81-87
    • /
    • 2018
  • Cloud computing is a computing environment in which users borrow as many IT resources as they need to, and use them over the network at any point in time. This is the concept of leasing and using as many IT resources as needed to lower IT resource usage costs and increase efficiency. Recently, cloud computing is emerging to provide stable service and volume of data along with major technological developments such as the Internet of Things, artificial intelligence and big data. However, for a more secure cloud environment, the importance of perimeter security such as shared resources and resulting secure data storage and access control is growing. This paper analyzes security threats in cloud computing environments and proposes a security architecture for effective response.