• Title/Summary/Keyword: computing hierarchy

Search Result 120, Processing Time 0.028 seconds

Cloud P2P OLAP: Query Processing Method and Index structure for Peer-to-Peer OLAP on Cloud Computing (Cloud P2P OLAP: 클라우드 컴퓨팅 환경에서의 Peer-to-Peer OLAP 질의처리기법 및 인덱스 구조)

  • Joo, Kil-Hong;Kim, Hun-Dong;Lee, Won-Suk
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.157-172
    • /
    • 2011
  • The latest active studies on distributed OLAP to adopt a distributed environment are mainly focused on DHT P2P OLAP and Grid OLAP. However, these approaches have its weak points, the P2P OLAP has limitations to multidimensional range queries in the cloud computing environment due to the nature of structured P2P. On the other hand, the Grid OLAP has no regard for adjacency and time series. It focused on its own sub set lookup algorithm. To overcome the above limits, this paper proposes an efficient central managed P2P approach for a cloud computing environment. When a multi-level hybrid P2P method is combined with an index load distribution scheme, the performance of a multi-dimensional range query is enhanced. The proposed scheme makes the OLAP query results of a user to be able to reused by other users' volatile cube search. For this purpose, this paper examines the combination of an aggregation cube hierarchy tree, a quad-tree, and an interval-tree as an efficient index structure. As a result, the proposed cloud P2P OLAP scheme can manage the adjacency and time series factor of an OLAP query. The performance of the proposed scheme is analyzed by a series of experiments to identify its various characteristics.

An Improved Coverage Efficient Clustering Method based on Time Delay for Wireless Sensor Networks (무선 센서 네트워크에서 시간지연 기반 향상된 커버리지 효율적인 클러스터링 방안)

  • Gong, Ji;Kim, Kwang-Ho;Go, Kwang-Sub;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.2
    • /
    • pp.1-10
    • /
    • 2009
  • Energy efficient operations are essential to increase the life time of wireless sensor network. A cluster-based protocol is the most common approach to preserve energy during a data aggregation. This paper deals with an energy awareness and autonomous clustering method based on time delay. This method consists of three stages. In the first phase, Candidate Cluster Headers(CCHs) are selected based on a time delay which reflects the remaining energy of a node, with considering coverage efficiency of a cluster. Then, time delay is again applied to declare Cluster Headers(CHs) out of the CCHs. In the last phase, the issue on an orphan node which is not included into a cluster is resolved. The simulation results show that the proposed method increases the life time of the network around triple times longer than LEACH(Low Energy Adaptive Cluster Hierarchy). Moreover, the cluster header frequency is less diverse, and the energy on cluster heads is less spent.

An Access Control Method considering Semantic Context for Privacy-preserving (개인정보 보호를 위한 의미적 상황을 반영하는 접근제어 방식)

  • Kang, Woo-Jun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.1-14
    • /
    • 2015
  • To conform to new emerging computing paradigm, various researches and challenges are being done. New information technologies make easy to access and acquire information in various ways. In other side, however, it also makes illegal access more powerful and various threat to system security. In this paper, we suggest a new extended access control method that make it possible to conform to security policies enforcement even with discrepancy between policy based constraints rules and query based constraints rules, based on their semantic information. New method is to derive security policy rules using context tree structure and to control the exceed granting of privileges through the degree of the semantic discrepancy. In addition, we illustrate prototype system architecture and make performance comparison with existing access control methods.

An Improved Interval AHP Method for Assessment of Cloud Platform-based Electrical Safety Monitoring System

  • Wang, Shou-Xiang;Ge, Lei-Jiao;Cai, Sheng-Xia;Zhang, Dong
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.959-968
    • /
    • 2017
  • Electrical safety monitoring System (ESMS) is a critical component in modern power systems, which is characterized by large-scale access points, massive users and versatile requirements. For convenience of the information integration and analysis, the software development, maintenance, and application in the system, the cloud platform based ESMS is established and assessed in this paper. Firstly the framework of the system is proposed, and then the assessment scheme with a set of evaluation indices are presented, by which the appropriate cloud product can be chosen to meet the requirements of a specific application. Moreover, to calculate the weights of the evaluation indices under uncertainty, an improved interval AHP method is adopted to take into consideration of the fuzziness of expert scoring, the qualitative consistency test, and the two normalizations in the process of eigenvectors. Case studies have been made to verify the feasibility of the assessment approach for ESMS.

An EFASIT model considering the emotion criteria in Knowledge Monitoring System (지식모니터링시스템에서 감성기준을 고려한 EFASIT 모델)

  • Ryu, Kyung-Hyun;Pi, Su-Young
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.107-117
    • /
    • 2011
  • The appearance of Web has brought an substantial revolution to all fields of society such knowledge management and business transaction as well as traditional information retrieval. In this paper, we propose an EFASIT(Extended Fuzzy AHP and SImilarity Technology) model considering the emotion analysis. And we combine the Extended Fuzzy AHP Method(EFAM) with SImilarity Technology(SIT) based on the domain corpus information in order to efficiently retrieve the document on the Web. The proposed the EFASIT model can generate the more definite rule according to integration of fuzzy knowledge of various decision-maker, and can give a help to decision-making, and confirms through the experiment.

A study on the Robust and Systolic Topology for the Resilient Dynamic Multicasting Routing Protocol

  • Lee, Kang-Whan;Kim, Sung-Uk
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.3
    • /
    • pp.255-260
    • /
    • 2008
  • In the recently years, there has been a big interest in ad hoc wireless network as they have tremendous military and commercial potential. An Ad hoc wireless network is composed of mobile computing devices that use having no fixed infrastructure of a multi-hop wireless network formed. So, the fact that limited resource could support the network of robust, simple framework and energy conserving etc. In this paper, we propose a new ad hoc multicast routing protocol for based on the ontology scheme called inference network. Ontology knowledge-based is one of the structure of context-aware. And the ontology clustering adopts a tree structure to enhance resilient against mobility and routing complexity. This proposed multicast routing protocol utilizes node locality to be improve the flexible connectivity and stable mobility on local discovery routing and flooding discovery routing. Also attempts to improve route recovery efficiency and reduce data transmissions of context-awareness. We also provide simulation results to validate the model complexity. We have developed that proposed an algorithm have design multi-hierarchy layered networks to simulate a desired system.

Routing protocol for efficient power consumption of sensor node (센서노드의 효율적인 전력소모를 위한 라우팅 프로토콜 연구)

  • Kim, Ki-Tae;Kim, Dong-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.382-385
    • /
    • 2011
  • The sensor network technology for core technology of ubiquitous computing is in the spotlight recently, the research on sensor network is proceeding actively which is composed many different sensor node. One of the important condition for design of sensor node is to extend for network life which is to minimize power-consumption under the limited resources of sensor network. This study suggest routing protocol that was used second level cluster structure to reduce power-consumption of sensor node. the first level use the previous routing protocol under the LEACH, second level decide to transmit or not by comparision of data value for Effective Usage, reduce the unnecessary power-consumption.

  • PDF

Archival Description and Records from Historically Marginalized Cultures: A View from a Postmodern Window

  • Sinn, Dong-Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.4
    • /
    • pp.115-130
    • /
    • 2010
  • In the archival field, the last decade has witnessed much discussion on archives' broad responsibilities for social memory. Considering that the social role of archives has stemmed from postmodern thinking suggests a paradigm shift from viewing archives as static recorded objects to viewing them as dynamic evidence of human memory. The modern archives and archivists are products of nineteenth-century positivism, limiting their function to archiving written documents within stable organizations. The new thoughts on the social role of archives provide a chance to realize that traditional archival practices have preserved only a sliver of organizational memory, thus ignoring fluid records of human activities and memory. Archival description is the primary method for users to access materials in archives. Thus, it can determine how archival materials will be used (or not used). The traditional archival description works as the representation of archival materials and is directly projected from the hierarchy of organizational documents. This paper argues that archivists will need to redefine archival description to be more sensitive to atypical types of archival materials from various cultural contexts. This paper surveys the postmodern approaches to archival concepts in relation to descriptive practices. It also examines some issues related to representing historically marginalized groups in archival description who were previously neglected in traditional archival practices.

Design and Implementation of Cable Data Subscriber Network Management System for High Speed Internet Service (초고속 인터넷서비스를 위한 케이블 데이터 가입자 망관리 시스템 설계 및 구현)

  • Yun Byeonh-Soo;Ha Eun-Ju
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.87-98
    • /
    • 2004
  • There are several types of distributed subscribers network using Asymmetric Digital Subscriber Line (ADSL), Very high-bit rate Digital Subscriber Line (VDSL), and Data Over Cable Service Interface Specifications (DOCSIS), The efficient and concentrated network management of those several distributed subscribers networks and resources require the general information model of network, which has abstract and conceptional managed objects independent of type of network and its equipment to manage the integrated subscriber network, This paper presents the general Internet subscribers network modeling framework using RM-ODP (Reference Model Open Distributed Processing) to manage that network In the form of integrated hierarchy, This paper adopts the object-oriented development methodology with UML (Unified Modeling Language) and designs and implements the HFC network of DOCSIS as an example of the subscriber network.

  • PDF

Generation of Video Clips Utilizing Shot Boundary Detection (샷 경계 검출을 이용한 영상 클립 생성)

  • Kim, Hyeok-Man;Cho, Seong-Kil
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.6
    • /
    • pp.582-592
    • /
    • 2001
  • Video indexing plays an important role in the applications such as digital video libraries or web VOD which archive large volume of digital videos. Video indexing is usually based on video segmentation. In this paper, we propose a software tool called V2Web Studio which can generate video clips utilizing shot boundary detection algorithm. With the V2Web Studio, the process of clip generation consists of the following four steps: 1) Automatic detection of shot boundaries by parsing the video, 2) Elimination of errors by manually verifying the results of the detection, 3) Building a modeling structure of logical hierarchy using the verified shots, and 4) Generating multiple video clips corresponding to each logically modeled segment. The aforementioned steps are performed by shot detector, shot verifier, video modeler and clip generator in the V2Web Studio respectively.

  • PDF