• Title/Summary/Keyword: computing hierarchy

Search Result 120, Processing Time 0.026 seconds

Embedded File System for Ubiquitous Computing (유비쿼터스 컴퓨팅을 위한 임베디드 파일시스템)

  • Lee, Byung-Kwon;Ju, Young-Kwan;Kim, Suk-Il;Jeon, Joong-Nam
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.4
    • /
    • pp.424-430
    • /
    • 2004
  • This paper explains the construction of the filesystems which could be utilized in embedded systems as an implementation of ubiquitous computing. It includes the formal architecture of filesystem hierarchy for the DOC (Disk-On-Chip) filesystem and the flash filesystem based on the MTD (Memory Technology Devices). For DOC, the root filesystem and the user filesystem are constructed by the TrueFFS supported by the M-Systems. For MTD filesystem, the root filesystem is implemented in the fast RAM disk, and the user filesystem is implemented in the JFFS2 that supports large capacity. In order to support the GUI filesystem, the porting process of Qt/E is also included in this paper.

A Study on Selection Factors of Personal Cloud Storage Service Using AHP (AHP를 활용한 개인 클라우드 스토리지 서비스 선택 요인에 관한 연구)

  • Jo, Hyeon;Cho, Hyegyeong;Kim, Younghee;Kim, Hayan;Jeon, Hyeon-Jeong;Lee, Jae Kwang
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.197-215
    • /
    • 2015
  • Recently, many internet users are using cloud computing. Users can manage, store and share their data and information by using personal cloud storage. In this paper, we aim to figure out influencing factors on personal cloud storage selection. The causal relationship between factors were identified through a importance analysis by using AHP(Analytic Hierarchy Process). AHP is a structured technique for organizing and analyzing complex decisions, based on mathematics and psychology. Research model consists of upper factorsincluding system factor, service factor and user factor. 12 lower factors and 6 alternatives were also analyzed. Asa result, system factor of 3 upper factors was found as the most important factor. Purpose-coincidence, security andaccessibility were top 3 factors among lower factors. N drive showed top importance value. We also conducted ANOVAby classifying 4 groups according to gender, age, currently used cloud and cloud to use. The results of this researchcan be useful guidelines for cloud computing industry.

HPC Technology Through SC20 (SC20를 통해 본 HPC 기술 동향)

  • Eo, I.S.;Mo, H.S.;Park, Y.M.;Han, W.J.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.3
    • /
    • pp.133-144
    • /
    • 2021
  • High-performance computing (HPC) is the underpinning for many of today's most exciting new research areas, to name a few, from big science to new ways of fighting the disease, to artificial intelligence (AI), to big data analytics, to quantum computing. This report captures the summary of a 9-day program of presentations, keynotes, and workshops at the SC20 conference, one of the most prominent events on sharing ideas and results in HPC technology R&D. Because of the exceptional situation caused by COVID-19, the conference was held entirely online from 11/9 to 11/19 2020, and interestingly caught more attention on using HPC to make a breakthrough in the area of vaccine and cure for COVID-19. The program brought together 103 papers from 21 countries, along with 163 presentations in 24 workshop sessions. The event has covered several key areas in HPC technology, including new memory hierarchy and interconnects for different accelerators, evaluation of parallel programming models, as well as simulation and modeling in traditional science applications. Notably, there was increasing interest in AI and Big Data analytics as well. With this summary of the recent HPC trend readers may find useful information to guide the R&D directions for challenging new technologies and applications in the area of HPC.

Theoretical Validation of Inheritance Metric in QMOOD against Weyuker's Properties

  • Alharthi, Mariam;Aljedaibi, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.284-296
    • /
    • 2021
  • Quality Models are important element of the software industry to develop and implement the best quality product in the market. This type of model provides aid in describing quality measures, which directly enhance the user satisfaction and software quality. In software development, the inheritance technique is an important mechanism used in object-oriented programming that allows the developers to define new classes having all the properties of super class. This technique supports the hierarchy design for classes and makes an "is-a" association among the super and subclasses. This paper describes a standard procedure for validating the inheritance metric in Quality Model for Object-Oriented Design (QMOOD) by using a set of nine properties established by Weyuker. These properties commonly using for investigating the effectiveness of the metric. The integration of two measuring methods (i.e. QMOOD and Weyuker) will provide new way for evaluating the software quality based on the inheritance context. The output of this research shows the extent of satisfaction of the inheritance metric in QMOOD against Weyuker nine properties. Further results proved that Weyker's property number nine could not fulfilled by any inheritance metrics. This research introduces a way for measuring software that developed using object-oriented approach. The theoretical validation of the inheritance metric presented in this paper is a small step taken towards producing quality software and in providing assistance to the software industry.

A Container Orchestration System for Process Workloads

  • Jong-Sub Lee;Seok-Jae Moon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.270-278
    • /
    • 2023
  • We propose a container orchestration system for process workloads that combines the potential of big data and machine learning technologies to integrate enterprise process-centric workloads. This proposed system analyzes big data generated from industrial automation to identify hidden patterns and build a machine learning prediction model. For each machine learning case, training data is loaded into a data store and preprocessed for model training. In the next step, you can use the training data to select and apply an appropriate model. Then evaluate the model using the following test data: This step is called model construction and can be performed in a deployment framework. Additionally, a visual hierarchy is constructed to display prediction results and facilitate big data analysis. In order to implement parallel computing of PCA in the proposed system, several virtual systems were implemented to build the cluster required for the big data cluster. The implementation for evaluation and analysis built the necessary clusters by creating multiple virtual machines in a big data cluster to implement parallel computation of PCA. The proposed system is modeled as layers of individual components that can be connected together. The advantage of a system is that components can be added, replaced, or reused without affecting the rest of the system.

The Concept of Computational Thinking through Analysis of Computer Education Framework in the United States and its Implications for the Curriculum of Software Education (미국 컴퓨터교육 프레임워크 분석을 통한 Computational Thinking의 개념과 교육과정 편성의 시사점 분석)

  • Shin, Seungki;Bae, Youngkwon
    • Journal of The Korean Association of Information Education
    • /
    • v.22 no.2
    • /
    • pp.251-262
    • /
    • 2018
  • In this study, we conducted to derive some implications by analyzing the computer education framework proposed by K12CS in the United States in order to organize the software curriculum and conceptualization of computational thinking in Korea. First, we discussed the use of the term Computational Thinking as a Computing Thinking in Korea and compare it with the concept presented in the US curriculum. we derived that Computing Thinking and Computational Thinking are different in the focus and scope of problem solving. Second, considering the fact that Korean software curriculum does not consider the hierarchy according to the school and the grade, we reconstructed the curriculum based on the core practices and concepts which were suggested by the organization of K-12 Computer Science in the United States.

The Competitiveness of Quality in the Air Service (항공서비스 품질의 경쟁력)

  • Lee, Sang-Suk
    • Journal of Korean Society for Quality Management
    • /
    • v.24 no.4
    • /
    • pp.124-140
    • /
    • 1996
  • This study aims to deveop a methodology for measuring the level of service quality in the air transportation. To measure the level of service quality, the approach taken here deals with not only the facility factors but also qualitative factors such as comfort and convenience as the influencing elements for service quality. The contents of this study can be summarized as follows: (1) For the systematic developement and management of air service, service factors of the air transportation are classified by AHP(analytic hierarchy process). (2) In computing the weight of service factors, a pairwise comparison method in AHP is used. (3) This study will suggest a method of measuring the competitive level of air service, and a result of an empirical study appling the method developed.

  • PDF

DEA-AR/AHP Model Design for Efficiency Evaluation of Metropolitan Rapid Transit (지하철 효율성 평가를 위한 DEA-AR/AHP 모형 설계)

  • Sim, Gwang-Sic;Kim, Jae-Yun
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.34 no.3
    • /
    • pp.105-124
    • /
    • 2009
  • Data Envelopment Analysis (DEA) is a methodology of computing the relative efficiency of each decision making unit (DMU) by comparing it with other DMUs having similar input and output structure. In this paper, we compare the efficiency of Korean rail transit corporations using DEA. To do this, we design a DEA-AR/AHP model, and evaluate efficiency by comparing the subway operating agencies of six big cities. The analysis reveals that Seoul Metro and Seoul city railroad construction turn out to be the most efficient groups. The result of this research can provide helpful information for effective management in a domestic subway operating agency.

THE MULTILEVEL SECURITY PROBLEM OVER CLASS SEMIGROUPS OF IMAGINARY QUADRATIC NON-MAXIMAL ORDERS

  • KIM, YONGTAE
    • Honam Mathematical Journal
    • /
    • v.28 no.2
    • /
    • pp.185-196
    • /
    • 2006
  • A scheme based on the cryptography for enforcing multilevel security in a system where hierarchy is represented by a partially ordered set was first introduced by Akl et al. But the key generation algorithm of Akl et al. is infeasible when there is a large number of users. In 1985, MacKinnon et al. proposed a paper containing a condition which prevents cooperative attacks and optimizes the assignment in order to overcome this shortage. In 2005, Kim et al. proposed key management systems for multilevel security using one-way hash function, RSA algorithm, Poset dimension and Clifford semigroup in the context of modern cryptography. In particular, the key management system using Clifford semigroup of imaginary quadratic non-maximal orders is based on the fact that the computation of a key ideal $K_0$ from an ideal $EK_0$ seems to be difficult unless E is equivalent to O. We, in this paper, show that computing preimages under the bonding homomorphism is not difficult, and that the multilevel cryptosystem based on the Clifford semigroup is insecure and improper to the key management system.

  • PDF

A Survey on Popular Human Factors in Agile Environment

  • Abidin, Faten Alia Zainal;Ghani, Imran
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.78-91
    • /
    • 2016
  • Various studies have proven that human is the biggest challenge in the process of transitioning to agile. Culture and mindset are two critical elements of human factors causing issues in agile environment. This study involved thirty-two (32) agile practitioners from nineteen (19) country to validate the issues from human factors. The purpose of the study is to discover human factors that required more attention and factors that give a low impact on the agile environment. Furthermore, this paper presents research analysis on some of popular human factors such as collaboration, hierarchy, communication and other critical factors which company may face. The results of this analysis can be used as a guide for IT organization to consider the critical challenges they may encounter.