• Title/Summary/Keyword: computing

Search Result 15,017, Processing Time 0.038 seconds

A study on the application of blockchain to the edge computing-based Internet of Things (에지 컴퓨팅 기반의 사물인터넷에 대한 블록체인 적용 방안 연구)

  • Choi, Jung-Yul
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.219-228
    • /
    • 2019
  • Thanks to the development of information technology and the vitalization of smart services, the Internet of Things (IoT) technology, in which various smart devices are connected to the network, has been continuously developed. In the legacy IoT architecture, data processing has been centralized based on cloud computing, but there are concerns about a single point of failure, end-to-end transmission delay, and security. To solve these problems, it is necessary to apply decentralized blockchain technology to the IoT. However, it is hard for the IoT devices with limited computing power to mine blocks, which consumes a great amount of computing resources. To overcome this difficulty, this paper proposes an IoT architecture based on the edge computing technology that can apply blockchain technology to IoT devices, which lack computing resources. This paper also presents an operaional procedure of blockchain in the edge computing-based IoT architecture.

Analyzing the Challenges for Cloud Computing Business Dissemination in the Service Provider's Perspective (클라우드 컴퓨팅 시장 확산을 위한 공급자 관점의 선결요인)

  • Park, Soo Kyung;Cho, Ji Yeon;Lee, Bong Gyou
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.99-116
    • /
    • 2015
  • The concept of Cloud computing has been introduced in the IT field over 10 years and industry has been expanding constantly. However, compare to the maturity of global market, Korea cloud computing industry is only in the early stage. Even the Korea has advantages in technology infrastructure; the pace of Korea cloud computing market growth is taking a serious downturn. Under these circumstances, it is needed to be discussing that strategy for expanding the cloud computing market size and for sustaining global competitiveness of local companies. Previous studies on plans for Korea cloud computing market has been conducted since 2009 and most of them are tend to examined in demand perspective. Thus, this study aims at identifying the priority of business challenges for making better performance in the market with service provider aspects. To analyze the important factors in the providing cloud computing service, ANP methodology was applied in this study. The network model including five clusters, security, stability, performance, consumer, and institution, was defined through literature review and expert survey was conducted to collect data. As a result of ANP analysis, 'Securing service reliability' was analyzed as the most important factor and followed by 'Preparing the range of legal liability', 'Preventing personal information leakage' and 'Preventing confidential information data leakage.' The priority of result indicates that service provider needs to focus on to make the secured service environment. This study has significance on analyzing the priority of business challenges in the service provider perspective. This study will provide useful guidelines to for establishing strategies in cloud computing market.

Web-based University Classroom Attendance System Based on Deep Learning Face Recognition

  • Ismail, Nor Azman;Chai, Cheah Wen;Samma, Hussein;Salam, Md Sah;Hasan, Layla;Wahab, Nur Haliza Abdul;Mohamed, Farhan;Leng, Wong Yee;Rohani, Mohd Foad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.503-523
    • /
    • 2022
  • Nowadays, many attendance applications utilise biometric techniques such as the face, fingerprint, and iris recognition. Biometrics has become ubiquitous in many sectors. Due to the advancement of deep learning algorithms, the accuracy rate of biometric techniques has been improved tremendously. This paper proposes a web-based attendance system that adopts facial recognition using open-source deep learning pre-trained models. Face recognition procedural steps using web technology and database were explained. The methodology used the required pre-trained weight files embedded in the procedure of face recognition. The face recognition method includes two important processes: registration of face datasets and face matching. The extracted feature vectors were implemented and stored in an online database to create a more dynamic face recognition process. Finally, user testing was conducted, whereby users were asked to perform a series of biometric verification. The testing consists of facial scans from the front, right (30 - 45 degrees) and left (30 - 45 degrees). Reported face recognition results showed an accuracy of 92% with a precision of 100% and recall of 90%.

Toward High Utilization of Heterogeneous Computing Resources in SNP Detection

  • Lim, Myungeun;Kim, Minho;Jung, Ho-Youl;Kim, Dae-Hee;Choi, Jae-Hun;Choi, Wan;Lee, Kyu-Chul
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.212-221
    • /
    • 2015
  • As the amount of re-sequencing genome data grows, minimizing the execution time of an analysis is required. For this purpose, recent computing systems have been adopting both high-performance coprocessors and host processors. However, there are few applications that efficiently utilize these heterogeneous computing resources. This problem equally refers to the work of single nucleotide polymorphism (SNP) detection, which is one of the bottlenecks in genome data processing. In this paper, we propose a method for speeding up an SNP detection by enhancing the utilization of heterogeneous computing resources often used in recent high-performance computing systems. Through the measurement of workload in the detection procedure, we divide the SNP detection into several task groups suitable for each computing resource. These task groups are scheduled using a window overlapping method. As a result, we improved upon the speedup achieved by previous open source applications by a magnitude of 10.

EOL Reasoner : Ontology-based knowledge reasoning engine (EOL Reasoner : 온톨로지 기반 지식 추론 엔진)

  • Jeon, Hyeong-Baek;Lee, Keon-Soo;Kim, Min-Koo
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.663-668
    • /
    • 2008
  • These days, computing systems need to be intelligent for satisfying general users' ambiguous requests. In order to make a system intelligent, several methods of managing knowledge have been proposed. Especially, in ubiquitous computing environment, where various computing objects are working together for achieving the given goal, ontology can be the best solutionfor knowledge management. In this paper, we proposed a novel reasoner processing ontology-based knowledge which is expressed in EOL. As this EOL reasoner uses less computing resource, it can be easily adapted to various computing objects in ubiquitous computing environment providing easy usability of knowledge.

  • PDF

A Fault Diagnosis and Reasoning Method based on Fault Tree (오류트리를 이용한 오류 진단 및 추론 기법)

  • Ko, Jae-Heon;Kim, Yeong-Duck;Min, Dong-Wook;Rhee, Hyun-Sook;Kim, Hoon-Ki;Jung, Suk-Yong;Park, Jeong-Min
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.12a
    • /
    • pp.441-444
    • /
    • 2009
  • 자가 치유 시스템은 자율 컴퓨팅의 개념 중 하나로 사람의 개입 없이 시스템의 이상상태를 인식하고 정상상태로 복귀 가능한 시스템을 의미한다. 발생한 오류는 또 다른 오류를 유발할 수 있고, 하나 이상의 원인이 되는 오류나 사건이 있을 수 있다. 따라서 오류의 원인에 따른 치유전략을 필요로 하며 발생한 오류에서부터 전이될 수 있는 오류에 대한 추론을 요구하게 된다. 따라서 본 논문에서는 오류의 인과관계에 따른 진단 및 추론 기법을 제안하고자 한다. 제안사항을 통해 오류트리를 기반으로 하여 발생한 오류의 원인이 되는 오류를 파악할 수 있으며, 오류의 원인에 따른 치유 전략을 계획 가능하고, 발생 가능한 오류의 추론이 가능하다.

  • PDF

Goal Tree based Testing Method for Self-healing System (자가 치유 시스템을 위한 목표 트리 기반 평가 기법)

  • Min, Dong-Wook;Kim, Yeong-Duck;Ko, Jae-Heon;Rhee, Hyun-Sook;Kim, Hoon-Ki;Jung, Suk-Yong;Park, Jeong-Min
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.12a
    • /
    • pp.436-440
    • /
    • 2009
  • 자가 치유란 시스템에서 발생될 수 있는 에러나 오류를 미리 예상하거나 감지하고 시스템 스스로 치유함으로써 시스템의 오동작을 최소화하는 것을 의미한다. 자가 치유 시스템의 신뢰성을 높이기 위해서는 정확한 테스트 기법이 필요하다. 하지만 기존의 테스트 기법은 성공 또는 실패만으로 나타내기때문에 정량적인 평가가 불가능하다. 따라서 본 논문에서는 자가 치유 시스템이 달성해야 할 목표를 추출하고 관계에 따라 트리로 작성하여 이를 기반으로 시스템의 자가 치유 기법의 성공률을 정량적 측정하는 기법을 제안한다. 본 기법을 통해 자가 치유 시스템의 치유 결과를 정량적으로 평가 가능하고, 평가결과를 기반으로 치유 전략에 대한 문제점이 분석 가능하므로 자가 치유 시스템의 신뢰성 향상이 가능하다.

  • PDF

Performance Improvement of BLAST using Grid Computing and Implementation of Genome Sequence Analysis System (그리드 컴퓨팅을 이용한 BLAST 성능개선 및 유전체 서열분석 시스템 구현)

  • Kim, Dong-Wook;Choi, Han-Suk
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.81-87
    • /
    • 2010
  • This paper proposes a G-BLAST(BLAST using Grid Computing) system, an integrated software package for BLAST searches operated in heterogeneous distributed environment. G-BLAST employed 'database splicing' method to improve the performance of BLAST searches using exists computing resources. G-BLAST is a basic local alignment search tool of DNA Sequence using grid computing in heterogeneous distributed environment. The G-BLAST improved the existing BLAST search performance in gene sequence analysis. Also G-BLAST implemented the pipeline and data management method for users to easily manage and analyze the BLAST search results. The proposed G-BLAST system has been confirmed the speed and efficiency of BLAST search performance in heterogeneous distributed computing.

User Authentication Technology using Multiple SSO in the Cloud Computing Environment

  • Cho, Min-Hee;Jang, Eun-Gyeom;Choi, Yong-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.4
    • /
    • pp.31-38
    • /
    • 2016
  • The interface between servers and clients and system management in the cloud computing environment is different from the existing computing environment. The technology for information protection. Management and user authentication has become an important issue. For providing a more convenient service to users, SSO technology is applied to this cloud computing service. In the SSO service environment, system access using a single key facilitates access to several servers at the same time. This SSO authentication service technology is vulnerable to security of several systems, once the key is exposed. In this paper, we propose a technology to solve problems, which might be caused by single key authentication in SSO-based cloud computing access. This is a distributed agent authentication technology using a multiple SSO agent to reinforce user authentication using a single key in the SSO service environment. For user authentication reinforcement, phased access is applied and trackable log information is used when there is a security problem in system to provide a safe cloud computing service.

The Concept of the Context-Aware Computing and Its Application to the Library Information Services (상황인식 컴퓨팅의 개념과 도서관 정보서비스에의 적용)

  • Lee, Jeong-Mee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.23 no.1
    • /
    • pp.179-194
    • /
    • 2012
  • This study explored the concept of context-aware computing and its application to the library and information services. Context-aware computing represents mobile computing techniques which gather, analyze user's contextual information and provide appropriate information services for the specific user. The idea was proposed in the late 90's but it was not widely available to the public because of the technology limitation. Recent technology development made context-aware computing possible to apply to our everyday-life information seeking using smart phone and showed the usefulness of its application. This study introduced the concept of context-aware computing with some examples of it, and finally tried to propose some of its applications to the library and information services.