• Title/Summary/Keyword: computing

Search Result 15,017, Processing Time 0.042 seconds

Qualitative Study on Service Features for Cloud Computing (클라우드 컴퓨팅의 서비스 특성에 관한 질적연구)

  • Ra, Jong-Hei
    • Journal of Digital Contents Society
    • /
    • v.12 no.3
    • /
    • pp.319-327
    • /
    • 2011
  • Cloud computing is the probated transmission-platform that provide the enterprise or individual with efficient and cost-effective IT service on internet. Cloud computing serve as data or computing is moved from desktop or portable PC to the massive data center. Searching for the services offered by cloud computing indicates that their current service feature needs to be improved to satisfy current and future customers. This study attempted to satisfy this need by identifying the service's features for the cloud computing service environment through qualitative approaches. Finally, we classify into seven features(Security, Reliability, Availability, Inter-operating, Economic, Intellectual Property) of cloud computing service.

Quantum Computing Impact on SCM and Hotel Performance

  • Adhikari, Binaya;Chang, Byeong-Yun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.1-6
    • /
    • 2021
  • For competitive hotel business, the hotel must have a sound prediction capability to balance the demand and supply of hospitality products. To have a sound prediction capability in the hotel, it should be prepared to be equipped with a new technology such as quantum computing. The quantum computing is a brand new cutting-edge technology. It will change hotel business and even the whole world too. Therefore, we study the impact of quantum computing on supply chain management (SCM) and hotel performance. Toward the goal we have developed the research model including six constructs: quantum (computing) prediction, communication, supplier relationship, service quality, non-financial performance, and financial performance. The result of the study shows a significant influence of quantum (computing) prediction on hotel performance through the mediating role of SCM in the hotel. Quantum prediction is highly significant in enhancing the SCM in the hotel. However, the direct effect between the quantum prediction and hotel performance is not significant. The finding indicates that hotels which would install the quantum computing technology and utilize the quantum prediction could hugely benefit from the performance improvement.

An Exhaustive Review on Security Issues in Cloud Computing

  • Fatima, Shahin;Ahmad, Shish
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3219-3237
    • /
    • 2019
  • The Cloud Computing is growing rapidly in the current IT industry. Cloud computing has become a buzzword in relation to Grid & Utility computing. It provides on demand services to customers and customers will pay for what they get. Various "Cloud Service Provider" such as Microsoft Azure, Google Web Services etc. enables the users to access the cloud in cost effective manner. However, security, privacy and integrity of data is a major concern. In this paper various security challenges have been identified and the survey briefs the comprehensive overview of various security issues in cloud computing. The classification of security issues in cloud computing have been studied. In this paper we have discussed security challenges in cloud computing and also list recommended methods available for addressing them in the literature.

Task Distribution Scheme based on Service Requirements Considering Opportunistic Fog Computing Nodes in Fog Computing Environments (포그 컴퓨팅 환경에서 기회적 포그 컴퓨팅 노드들을 고려한 서비스 요구사항 기반 테스크 분배 방법)

  • Kyung, Yeunwoong
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.1
    • /
    • pp.51-57
    • /
    • 2021
  • In this paper, we propose a task distribution scheme in fog computing environment considering opportunistic fog computing nodes. As latency is one of the important performance metric for IoT(Internet of Things) applications, there have been lots of researches on the fog computing system. However, since the load can be concentrated to the specific fog computing nodes due to the spatial and temporal IoT characteristics, the load distribution should be considered to prevent the performance degradation. Therefore, this paper proposes a task distribution scheme which considers the static as well as opportunistic fog computing nodes according to their mobility feature. Especially, based on the task requirements, the proposed scheme supports the delay sensitive task processing at the static fog node and delay in-sensitive tasks by means of the opportunistic fog nodes for the task distribution. Based on the performance evaluation, the proposed scheme shows low service response time compared to the conventional schemes.

Development of UWB-based Indoor Navigation App (UWB 기반 실내 내비게이션 앱 개발)

  • Hyunwoo You;Jungkyun Lee;Somi Nam;Juyeon Lee;Yoonseo Lee;Minsung Kim;Youngchan Lee;Hong Min
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.147-148
    • /
    • 2023
  • 실내 내비게이션 기술은 시설물 구조에 익숙하지 않은 방문자의 길 안내뿐만 아니라 무인 이동체들의 위치를 파악하는 데 중요한 역할을 한다. 본 논문에서는 UWB 기술을 활용하여 타깃 영역 안에서의 좌표를 추출하고 이를 활용하여 길 안내를 해주는 앱을 개발하였다. 개발된 앱은 보정 기법을 통해 사용자의 실제 위치와 지도 위에 표시되는 위치 사이의 오차를 최소화하였다.

HTCaaS(High Throughput Computing as a Service) in Supercomputing Environment (슈퍼컴퓨팅환경에서의 대규모 계산 작업 처리 기술 연구)

  • Kim, Seok-Kyoo;Kim, Jik-Soo;Kim, Sangwan;Rho, Seungwoo;Kim, Seoyoung;Hwang, Soonwook
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.5
    • /
    • pp.8-17
    • /
    • 2014
  • Petascale systems(so called supercomputers) have been mainly used for supporting communication-intensive and tightly-coupled parallel computations based on message passing interfaces such as MPI(HPC: High-Performance Computing). On the other hand, computing paradigms such as High-Throughput Computing(HTC) mainly target compute-intensive (relatively low I/O requirements) applications consisting of many loosely-coupled tasks(there is no communication needed between them). In Korea, recently emerging applications from various scientific fields such as pharmaceutical domain, high-energy physics, and nuclear physics require a very large amount of computing power that cannot be supported by a single type of computing resources. In this paper, we present our HTCaaS(High-Throughput Computing as a Service) which can leverage national distributed computing resources in Korea to support these challenging HTC applications and describe the details of our system architecture, job execution scenario and case studies of various scientific applications.

An Authentication Scheme Using OAuth and Cyber Physical Social System (Cyber-Physical-Social 시스템과 OAuth를 이용한 IoT 인증 기법)

  • Cho, Jeong-woo;Lee, Kuk-young;Lee, Ki Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.348-351
    • /
    • 2016
  • Recently on IoT environment, there is necessary of protected network, which is only specific user can access it. Applying OAuth protocol on IoT, it can be easier to construct network authentication system, but it is hard to construct protected network authentication system. And there is weakness of OAuth protocol, which is easily attacked by sniffing Token by attacker. So, it is necessary to secondary authentication for OAuth. In ultimate IoT, the fog computing is essential. Fog computing is extension of cloud that enables networking not only in core system but also in edge system and communication node to node. Strength of fog computing is location awareness, support for mobility, and so on. If authentication in fog computing uses this strength, it can be more specialized in Fog Computing. So, in secondary Authentication, using Cyber-Physical-Social System will increase convenience of user than using existing authentication system, such as authentication certificate, id/password and group key, which is inconvenient for user. This study is about authentication based Cyber-Physical-Social System.

  • PDF

Analysis of K-Defense Cloud Computing Service Availability Considering of Cloud Computing Traffic Growth (클라우드 컴퓨팅 트래픽 증가를 고려한 국방 클라우드 컴퓨팅 서비스 가용성 분석)

  • Lee, Sung-Tae;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.93-100
    • /
    • 2013
  • In 2012, According to 'Cisco Global Cloud Index 2011-2016', the Cisco company forecasted that global data center traffic will nearly quadruple and cloud traffic will nearly sextuple by 2016. Such a rapid growing of traffic is caused by traffic inside the data center and cloud computing workloads. In 2010, the Ministry of National Defense decided to build a Mega Center including the cloud computing technology by 2014, as part of the '2012 Information Service Plan', which is now underway. One of the factors to consider is cloud computing traffic to build a Mega Center. Since the K-defense cloud computing system is built, K-defense cloud computing traffic will increase steadily. This paper, analyzed the availability of K-defense cloud computing service with the K-defense cloud computing traffic increasing using K-Defense cloud computing test system and CloudAnalyst simulation tool. Created 3 scenarios and Simulated with these scenarios, the results are derived that the availability of K-defense cloud computing test system is fulfilled, even cloud workloads are increased as muh as forecasted cloud traffic growth from now until 2016.

An Offloading Scheduling Strategy with Minimized Power Overhead for Internet of Vehicles Based on Mobile Edge Computing

  • He, Bo;Li, Tianzhang
    • Journal of Information Processing Systems
    • /
    • v.17 no.3
    • /
    • pp.489-504
    • /
    • 2021
  • By distributing computing tasks among devices at the edge of networks, edge computing uses virtualization, distributed computing and parallel computing technologies to enable users dynamically obtain computing power, storage space and other services as needed. Applying edge computing architectures to Internet of Vehicles can effectively alleviate the contradiction among the large amount of computing, low delayed vehicle applications, and the limited and uneven resource distribution of vehicles. In this paper, a predictive offloading strategy based on the MEC load state is proposed, which not only considers reducing the delay of calculation results by the RSU multi-hop backhaul, but also reduces the queuing time of tasks at MEC servers. Firstly, the delay factor and the energy consumption factor are introduced according to the characteristics of tasks, and the cost of local execution and offloading to MEC servers for execution are defined. Then, from the perspective of vehicles, the delay preference factor and the energy consumption preference factor are introduced to define the cost of executing a computing task for another computing task. Furthermore, a mathematical optimization model for minimizing the power overhead is constructed with the constraints of time delay and power consumption. Additionally, the simulated annealing algorithm is utilized to solve the optimization model. The simulation results show that this strategy can effectively reduce the system power consumption by shortening the task execution delay. Finally, we can choose whether to offload computing tasks to MEC server for execution according to the size of two costs. This strategy not only meets the requirements of time delay and energy consumption, but also ensures the lowest cost.

Biologically inspired soft computing methods in structural mechanics and engineering

  • Ghaboussi, Jamshid
    • Structural Engineering and Mechanics
    • /
    • v.11 no.5
    • /
    • pp.485-502
    • /
    • 2001
  • Modem soft computing methods, such as neural networks, evolutionary models and fuzzy logic, are mainly inspired by the problem solving strategies the biological systems use in nature. As such, the soft computing methods are fundamentally different from the conventional engineering problem solving methods, which are based on mathematics. In the author's opinion, these fundamental differences are the key to the full understanding of the soft computing methods and in the realization of their full potential in engineering applications. The main theme of this paper is to discuss the fundamental differences between the soft computing methods and the mathematically based conventional methods in engineering problems, and to explore the potential of soft computing methods in new ways of formulating and solving the otherwise intractable engineering problems. Inverse problems are identified as a class of particularly difficult engineering problems, and the special capabilities of the soft computing methods in inverse problems are discussed. Soft computing methods are especially suited for engineering design, which can be considered as a special class of inverse problems. Several examples from the research work of the author and his co-workers are presented and discussed to illustrate the main points raised in this paper.