• 제목/요약/키워드: computing environment

검색결과 3,231건 처리시간 0.033초

웨어러블 컴퓨팅을 위한 서비스 인프라 구조 (Service Infrastructure of Wearable Computing)

  • 한동원;박준석;조일연
    • 대한인간공학회지
    • /
    • 제24권1호
    • /
    • pp.43-46
    • /
    • 2005
  • The future information technologies and service paradigm will move from PC, the general purpose desktop computing environment, to the next-generation PC that provides information any where, any time, and any device. The next-generation PC such as wearable computers are specialized to the human-centric functionalities and always-on connected services. In this study, service infrastructure of wearable computing with WBAN(Wearable Body Area Network) was suggested for the ubiquitous computing environment.

인터넷 기반 분산컴퓨팅환경에서 자원할당을 위한 피어 가용길이 예상 기법 (A Peer Availability Period Prediction Strategy for Resource Allocation in Internet-based Distributed Computing Environment)

  • 김진일
    • 한국컴퓨터정보학회논문지
    • /
    • 제11권4호
    • /
    • pp.69-75
    • /
    • 2006
  • 과학 기술이 발전함에 따라 대량의 정보를 처리하기 위해 대두된 인터넷을 기반으로 하는 분산 컴퓨팅 환경은 대규모의 독립된 자원을 공유하여 과학 연구와 같은 문제를 해결하기 위한 구축된 환경이므로, 사용자 작업을 효율적으로 할당하기 위한 스케줄링 알고리즘이 필요하다. 현재까지 여러 스케줄링 알고리즘이 연구되어 왔지만, 대부분 피어의 자율성을 고려하지 않는 문제점을 가지고 있다. 본 논문에서는 이러한 문제점을 해결하기 위하여 인터넷기반 분산 컴퓨팅 환경에서의 피어 가용길이 예상 기법을 제안하였다. 또한 인터넷기반 분산 컴퓨팅환경에서 사용되는 SRTFIT 알고리즘에 적용하여, 시뮬레이션을 통하여 제안된 기법이 단순한 예상기법보다 성능이 뛰어남을 보였다.

  • PDF

Application of Urban Computing to Explore Living Environment Characteristics in Seoul : Integration of S-Dot Sensor and Urban Data

  • Daehwan Kim;Woomin Nam;Keon Chul Park
    • 인터넷정보학회논문지
    • /
    • 제24권4호
    • /
    • pp.65-76
    • /
    • 2023
  • This paper identifies the aspects of living environment elements (PM2.5, PM10, Noise) throughout Seoul and the urban characteristics that affect them by utilizing the big data of the S-Dot sensors in Seoul, which has recently become a hot topic. In other words, it proposes a big data based urban computing research methodology and research direction to confirm the relationship between urban characteristics and living environments that directly affect citizens. The temporal range is from 2020 to 2021, which is the available range of time series data for S-Dot sensors, and the spatial range is throughout Seoul by 500mX500m GRID. First of all, as part of analyzing specific living environment patterns, simple trends through EDA are identified, and cluster analysis is conducted based on the trends. After that, in order to derive specific urban planning factors of each cluster, basic statistical analysis such as ANOVA, OLS and MNL analysis were conducted to confirm more specific characteristics. As a result of this study, cluster patterns of environment elements(PM2.5, PM10, Noise) and urban factors that affect them are identified, and there are areas with relatively high or low long-term living environment values compared to other regions. The results of this study are believed to be a reference for urban planning management measures for vulnerable areas of living environment, and it is expected to be an exploratory study that can provide directions to urban computing field, especially related to environmental data in the future.

Resource Management Strategies in Fog Computing Environment -A Comprehensive Review

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.310-328
    • /
    • 2022
  • Internet of things (IoT) has emerged as the most popular technique that facilitates enhancing humans' quality of life. However, most time sensitive IoT applications require quick response time. So, processing these IoT applications in cloud servers may not be effective. Therefore, fog computing has emerged as a promising solution that addresses the problem of managing large data bandwidth requirements of devices and quick response time. This technology has resulted in processing a large amount of data near the data source compared to the cloud. However, efficient management of computing resources involving balancing workload, allocating resources, provisioning resources, and scheduling tasks is one primary consideration for effective computing-based solutions, specifically for time-sensitive applications. This paper provides a comprehensive review of the source management strategies considering resource limitations, heterogeneity, unpredicted traffic in the fog computing environment. It presents recent developments in the resource management field of the fog computing environment. It also presents significant management issues such as resource allocation, resource provisioning, resource scheduling, task offloading, etc. Related studies are compared indifferent mentions to provide promising directions of future research by fellow researchers in the field.

모바일 환경에서 에이전트를 이용한 설계자원의 통합 (A Study for agent-based Integration Framework in mobile environment)

  • 옥형석;이수홍
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 1997년도 추계학술대회 논문집
    • /
    • pp.193-196
    • /
    • 1997
  • A mobile computing environment has many difference in character from conventional communication over wired network. These include very presents distributed design system based the mobile agent for mobile computing environment. To integrate design resource, we presented ISA(Integration Service Agent, which allows a designer to build integrated application using distributed resources, and to collaborative by exchanging service. Also we propose ICM(XML based Intelligent Connection Manger) using mobile agent. And suggested new intelligent data and process transfer architecture using ICM to implement an agent based design system in mobile environment.

  • PDF

SSO based Security Management in Cloud Computing Environment

  • Jing, Si Da;Jung, Young-Min;Chung, Mok-Dong
    • 정보처리학회지
    • /
    • 제17권2호
    • /
    • pp.18-29
    • /
    • 2010
  • In this paper, we surveyed SSO based security management including the knowledge domain of the area of cloud and its relevant components. Cloud computing refers to the delivery of software and other technology services over the Internet by a service provider. SSO refers to the ability to log on to a single security system once, rather than logging on separately to multiple security systems. Existing SSO solutions in cloud computing environment suggest several methods. SSO-based security Issues illustrate these key items in cloud computing environment such as risks and security vulnerabilities of SSO. SSO supports for multiple and different domains in cloud computing environment.

  • PDF

그리드 환경하에서 고성능 컴퓨팅을 이용한 열유동 해석 기법에 관한 기초연구 (A Fundamental Study of Thermal-Fluid Flow Analysis using High Performance Computing under the GRID)

  • 홍승도;이대성;이재룡;하만영;이상산
    • 대한기계학회:학술대회논문집
    • /
    • 대한기계학회 2003년도 추계학술대회
    • /
    • pp.928-933
    • /
    • 2003
  • For simulation of three-dimensional turbulent flow with LES and DNS takes much time and expense with current available computing resources. It is nearly impossible to simulate turbulent flow with high Reynolds number. So, the emerging alternative is the Grid computing for needed computation power and working environment. In this study, the CFD code was parallelized to adapt it for the parallel computing under the Grid environment. In the first place, the Grid environment was built to connect the PC-Cluster facilities belong to the different institutions using communication network system. And CFD applications were calculated to check the performance of the parallel code developed for the Grid environment. Although it is a fundamental study, it brings about a important meaning as first step in research of the Grid.

  • PDF

Task Scheduling in Fog Computing - Classification, Review, Challenges and Future Directions

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.89-100
    • /
    • 2022
  • With the advancement in the Internet of things Technology (IoT) cloud computing, billions of physical devices have been interconnected for sharing and collecting data in different applications. Despite many advancements, some latency - specific application in the real world is not feasible due to existing constraints of IoT devices and distance between cloud and IoT devices. In order to address issues of latency sensitive applications, fog computing has been developed that involves the availability of computing and storage resources at the edge of the network near the IoT devices. However, fog computing suffers from many limitations such as heterogeneity, storage capabilities, processing capability, memory limitations etc. Therefore, it requires an adequate task scheduling method for utilizing computing resources optimally at the fog layer. This work presents a comprehensive review of different task scheduling methods in fog computing. It analyses different task scheduling methods developed for a fog computing environment in multiple dimensions and compares them to highlight the advantages and disadvantages of methods. Finally, it presents promising research directions for fellow researchers in the fog computing environment.

An Efficient Multi-Layer Encryption Framework with Authentication for EHR in Mobile Crowd Computing

  • kumar, Rethina;Ganapathy, Gopinath;Kang, GeonUk
    • International journal of advanced smart convergence
    • /
    • 제8권2호
    • /
    • pp.204-210
    • /
    • 2019
  • Mobile Crowd Computing is one of the most efficient and effective way to collect the Electronic health records and they are very intelligent in processing them. Mobile Crowd Computing can handle, analyze and process the huge volumes of Electronic Health Records (EHR) from the high-performance Cloud Environment. Electronic Health Records are very sensitive, so they need to be secured, authenticated and processed efficiently. However, security, privacy and authentication of Electronic health records(EHR) and Patient health records(PHR) in the Mobile Crowd Computing Environment have become a critical issue that restricts many healthcare services from using Crowd Computing services .Our proposed Efficient Multi-layer Encryption Framework(MLEF) applies a set of multiple security Algorithms to provide access control over integrity, confidentiality, privacy and authentication with cost efficient to the Electronic health records(HER)and Patient health records(PHR). Our system provides the efficient way to create an environment that is capable of capturing, storing, searching, sharing, analyzing and authenticating electronic healthcare records efficiently to provide right intervention to the right patient at the right time in the Mobile Crowd Computing Environment.

A Framework for Agile Development in Cloud Computing Environment

  • Younas, Muhammad;Ghani, Imran;Jawawi, Dayang Norhayati Abang;Khan, Muhammad Murad
    • 인터넷정보학회논문지
    • /
    • 제17권5호
    • /
    • pp.67-74
    • /
    • 2016
  • Distributed agile software development faces difficulties for instance lack of visibility across development and delivery processes, complex and disjointed development processes, inability to capitalize on business opportunities, lack of communication agility between disconnected owners, development teams, and users or clients. However these difficulties are solved with the help of cloud computing services. This study proposes a framework to provide a skeletal or structural environment for distributed agile software development in cloud computing environment. The framework guide towards the best tooling to deliver a consistent, automated, governed, and unified agile software development process with reduced technical debt, and minimized project backlog. In addition to this, the study highlights the benefits of cloud computing in agile software development.