• Title/Summary/Keyword: computing infrastructure

Search Result 504, Processing Time 0.022 seconds

Design and modelling of pre-cast steel-concrete composites for resilient railway track slabs

  • Mirza, Olivia;Kaewunruen, Sakdirat;Kwok, Kenny;Griffin, Dane W.P.
    • Steel and Composite Structures
    • /
    • v.22 no.3
    • /
    • pp.537-565
    • /
    • 2016
  • Australian railway networks possess a large amount of aging timber components and need to replace them in excess of 280 thousands $m^3$ per year. The relatively high turnover of timber sleepers (crossties in a plain track), bearers (skeleton ties in a turnout), and transoms (bridge cross beams) is responsible for producing greenhouse gas emissions 6 times greater than an equivalent reinforced concrete counterparts. This paper presents an innovative solution for the replacement of aging timber transoms installed on existing railway bridges along with the incorporation of a continuous walkway platform, which is proven to provide environmental, safety and financial benefits. Recent developments for alternative composite materials to replace timber components in railway infrastructure construction and maintenance demonstrate some compatibility issues with track stiffness as well as structural and geometrical track systems. Structural concrete are generally used for new railway bridges where the comparatively thicker and heavier fixed slab track systems can be accommodated. This study firstly demonstrates a novel and resilient alterative by incorporating steel-concrete composite slab theory and combines the capabilities of being precast and modulated, in order to reduce the depth, weight and required installation time relative to conventional concrete direct-fixation track slab systems. Clear benefits of the new steel-concrete composites are the maintainability and constructability, especially for existing railway bridges (or brown fields). Critical considerations in the design and finite element modelling for performance benchmarking of composite structures and their failure modes are highlighted in this paper, altogether with risks, compatibilities and compliances.

Regional Information Infrastructure and Competitiveness (지역 정보 인프라와 기업 경쟁력 강화 방안)

  • 김유일;조영복;방호열;장활식;서문식;신종국
    • The Journal of Information Systems
    • /
    • v.8 no.1
    • /
    • pp.149-176
    • /
    • 1999
  • Regional information infrastructure(RII) plays an increasingly important role in determining the competitiveness of companies operating within the region. The purposes of this research are (1) to identify the types of RII demanded by the companies operating within Pusan and KyungNam areas in Republic of Korea, (2) to explain the levels of RII demand using variables including organizational environment, organizational strategy, and the importance of information systems for the organization, and (3) to examine whether the types of RII demand are different depending on the competition strategies that companies are pursuing. The most important type of RII that region companies demand is information systems personnel having knowledge in systems control, systems planning, communication network, database administration, and system construction. In addition, demanded are TSDN, satellite communication network, and shareable software and hardware. The levels of RII demand are different depending on the importance of information systems(IS) roles for the businesses. The more important IS role is for a company, the more sharable computing equipments and facilities are demanded. The importance of IS role is affected by the organizational environment and organizational strategy. The levels of RII demand are different also depending on the competitive advantages that companies are pursuing. Companies focusing on achieving short-term and direct benefits using information technology tend to have higher demands on sharable computing equipments and facilities as well as on information communication services. This research is explorative in nature One major limitation of this research, therefore, is that the plausibility of the postulated hypotheses was not examined simultaneously. This research is meaningful in that it first attempted to measure the demands of regional companies for RII.

  • PDF

Virtual Machine Provisioning Scheduling with Conditional Probability Inference for Transport Information Service in Cloud Environment (클라우드 환경의 교통정보 서비스를 위한 조건부 확률 추론을 이용한 가상 머신 프로비저닝 스케줄링)

  • Kim, Jae-Kwon;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.4
    • /
    • pp.139-147
    • /
    • 2011
  • There is a growing tendency toward a vehicle demand and a utilization of traffic information systems. Due to various kinds of traffic information systems and increasing of communication data, the traffic information service requires a very high IT infrastructure. A cloud computing environment is an essential approach for reducing a IT infrastructure cost. And the traffic information service needs a provisioning scheduling method for managing a resource. So we propose a provisioning scheduling with conditional probability inference (PSCPI) for the traffic information service on cloud environment. PSCPI uses a naive bayse inference technique based on a status of a virtual machine. And PSCPI allocates a job to the virtual machines on the basis of an availability of each virtual machine. Naive bayse based PSCPI provides a high throughput and an high availability of virtual machines for real-time traffic information services.

Data Model Study for National Research Data Commons Service (국가연구데이터커먼즈 서비스를 위한 데이터모델 연구)

  • Cho, Minhee;Lee, Mikyoung;Song, Sa-kwang;Yim, Hyung-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.436-438
    • /
    • 2022
  • National Research Data Commons aims to build a system that can be used jointly by arranging analysis resources such as computing infrastructure, software, toolkit, API, and services used for data analysis together with research data to maximize the use of research data. do. The sharing and utilization system for publications and research data in the R&D process is well known. However, the environment in which data and tightly coupled software and computing infrastructure can be shared and utilized is insignificant and there is no management system. In this study, a data model is designed to systematically manage information on digital research resources required in the data-oriented R&D research process. This will be used to register and manage digital research resource information in the National Research Data Commons Service.

  • PDF

A Building Method of Security Architecture Framework on the Medical Information Network Environment (의료정보시스템상에서의 네트워크 보안기능 프레임워크와 보안 아키텍쳐 설계방법)

  • Lee, Dae-Sung;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.3-9
    • /
    • 2011
  • On health information network architecture, traffic along the path of traffic and security, blocking malicious code penetration is performed. The medical information system network security infrastructure study, which was whether to be designed based on the structure and methodology is designed to develop the security features. Health informati on system's functionality and capabilities framework for infrastructure is the backbone and structure. The design fea tures a framework for the overall network structure formation of the skeleton and forms the basic structure of the security methodology. Infrastructure capabilities to build the framework and the application functionality is being implemented. Differentiated in accordance with security zones to perform security functions and security mechanisms that operate through this study is to present. u-Healthcare future advent of cloud computing and a new health information environment, the medical information on the preparation of this study is expected to be utilized for security.

Self-organization Networking Scheme for Constructing Infrastructure-less based IoT Network (비인프라 기반 사물인터넷 구축을 위한 자율네트워킹 기법)

  • Youn, Joosang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.196-201
    • /
    • 2018
  • Recently, various infrastructure-less IoT networking schemes have been studied to construct local IoT networks based on self-organization. This is, because RPL protocol, which is to support infrastructure based network construction is used to construct local IoT networks. Thus, a self-organization networking and ad hoc path between client and server in local IoT networks is not supported in basis RPL protocol. In this paper, we propose a self-organization networking scheme which support infrastructure-less based IoT network construction in low-power and lossy network based IoT environments consisting of IoT devices with the constrained feature, such as low power, the limited transmission rate and low computing capacity. Through simulation, we show that the proposed self-organization networking scheme improves the performance, in terms of the number of packets generated for end-to end data transmission and the end-to-end delay, compared to basis RPL protocol.

A Novel Auditing System for Dynamic Data Integrity in Cloud Computing (클라우드 컴퓨팅에서 동적 데이터 무결성을 위한 개선된 감사 시스템)

  • Kim, Tae-yeon;Cho, Gi-hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1818-1824
    • /
    • 2015
  • Cloud computing draws attention as an application to provide dynamically scalable infrastructure for application, data and file storage. An untrusted remote server can cause a variety of problems in the field of data protection. It may process intentionally or involuntarily user's data operations(modify, insert, delete) without user's permission. It may provide false information in order to hide his mistakes in the auditing process. Therefore, it is necessary to audit the integrity of data stored in the cloud server. In this paper, we propose a new data auditing system that can verify whether servers had a malicious behavior or not. Performance and security analysis have proven that our scheme is suitable for cloud computing environments in terms of performance and security aspects.

Pub/Sub-based Sensor virtualization framework for Cloud environment

  • Ullah, Mohammad Hasmat;Park, Sung-Soon;Nob, Jaechun;Kim, Gyeong Hun
    • International journal of advanced smart convergence
    • /
    • v.4 no.2
    • /
    • pp.109-119
    • /
    • 2015
  • The interaction between wireless sensors such as Internet of Things (IoT) and Cloud is a new paradigm of communication virtualization to overcome resource and efficiency restriction. Cloud computing provides unlimited platform, resources, services and also covers almost every area of computing. On the other hand, Wireless Sensor Networks (WSN) has gained attention for their potential supports and attractive solutions such as IoT, environment monitoring, healthcare, military, critical infrastructure monitoring, home and industrial automation, transportation, business, etc. Besides, our virtual groups and social networks are in main role of information sharing. However, this sensor network lacks resource, storage capacity and computational power along with extensibility, fault-tolerance, reliability and openness. These data are not available to community groups or cloud environment for general purpose research or utilization yet. If we reduce the gap between real and virtual world by adding this WSN driven data to cloud environment and virtual communities, then it can gain a remarkable attention from all over, along with giving us the benefit in various sectors. We have proposed a Pub/Sub-based sensor virtualization framework Cloud environment. This integration provides resource, service, and storage with sensor driven data to the community. We have virtualized physical sensors as virtual sensors on cloud computing, while this middleware and virtual sensors are provisioned automatically to end users whenever they required. Our architecture provides service to end users without being concerned about its implementation details. Furthermore, we have proposed an efficient content-based event matching algorithm to analyze subscriptions and to publish proper contents in a cost-effective manner. We have evaluated our algorithm which shows better performance while comparing to that of previously proposed algorithms.

Comparative Analysis of the Virtual Machine and Containers Methods through the Web Server Configuration (웹 서버 구성을 통한 가상머신과 컨테이너 방식 비교 분석)

  • Bae, Yu-Mi;Jung, Sung-Jae;Soh, Woo-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.11
    • /
    • pp.2670-2677
    • /
    • 2014
  • The technique of virtual machine construction using hypervisor such as Xen and KVM is mainly used for implementation of cloud computing infrastructure. This technique is efficient in allocating and managing resources compared to the existing operation methods. However it requires high resource usage when constructing virtual machines and results in wasting of resources when not using the allocated resources. Docker is a technique based on the container method to resolve such a problem. This paper shows the container method such as Docker is efficient as a web construction technique by comparing virtual machine method to container method. It is shown to be especially useful when storing data into DB or storage devices in such environments of web server or program development. In the upcoming cloud computing environment the container method such as Docker is expected to improve the resource efficiency and the convenience of management.

A Case Study of Drug Repositioning Simulation based on Distributed Supercomputing Technology (분산 슈퍼컴퓨팅 기술에 기반한 신약재창출 시뮬레이션 사례 연구)

  • Kim, Jik-Soo;Rho, Seungwoo;Lee, Minho;Kim, Seoyoung;Kim, Sangwan;Hwang, Soonwook
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.15-22
    • /
    • 2015
  • In this paper, we present a case study for a drug repositioning simulation based on distributed supercomputing technology that requires highly efficient processing of large-scale computations. Drug repositioning is the application of known drugs and compounds to new indications (i.e., new diseases), and this process requires efficient processing of a large number of docking tasks with relatively short per-task execution times. This mechanism shows the main characteristics of a Many-Task Computing (MTC) application, and as a representative case of MTC applications, we have applied a drug repositioning simulation in our HTCaaS system which can leverage distributed supercomputing infrastructure, and show that efficient task dispatching, dynamic resource allocation and load balancing, reliability, and seamless integration of multiple computing resources are crucial to support these challenging scientific applications.