• Title/Summary/Keyword: computing model

Search Result 3,327, Processing Time 0.035 seconds

A PRICING METHOD OF HYBRID DLS WITH GPGPU

  • YOON, YEOCHANG;KIM, YONSIK;BAE, HYEONG-OHK
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.20 no.4
    • /
    • pp.277-293
    • /
    • 2016
  • We develop an efficient numerical method for pricing the Derivative Linked Securities (DLS). The payoff structure of the hybrid DLS consists with a standard 2-Star step-down type ELS and the range accrual product which depends on the number of days in the coupon period that the index stay within the pre-determined range. We assume that the 2-dimensional Geometric Brownian Motion (GBM) as the model of two equities and a no-arbitrage interest model (One-factor Hull and White interest rate model) as a model for the interest rate. In this study, we employ the Monte Carlo simulation method with the Compute Unified Device Architecture (CUDA) parallel computing as the General Purpose computing on Graphic Processing Unit (GPGPU) technology for fast and efficient numerical valuation of DLS. Comparing the Monte Carlo method with single CPU computation or MPI implementation, the result of Monte Carlo simulation with CUDA parallel computing produces higher performance.

An Empirical Study on the Influence of Environmental Determinants on the Mobile Cloud Computing Technology Usage and the Moderating Effects of Job Relevance (모바일 클라우드 컴퓨팅 기술사용에 영향을 주는 환경적 요인과 직무 관련성의 조절효과에 대한 실증연구)

  • Kim, Sang-Hyun;Kim, Geun-A
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.4
    • /
    • pp.1-20
    • /
    • 2011
  • The recent development of mobile devices, including smartphones has maximized the user's convenience. This phenomenon has triggered the specification and activation of mobile cloud service and transformed the user's information usage and communication means. Despite such development of new technology, there is little understanding of mobile cloud. Therefor, in order to help the understanding of the usage of mobile cloud computing technology, this study developed the research model based on the UTAUT (the Unified Theory of Acceptance and Usage of Technology) model. The proposed research model included five external determinants, such as Interoperability, Information Organization, Adequacy, Information Security and Context Awareness, along with the moderating effects of Job Relevance, and empirically proved their influence on the user's job performance. This study proved the research model by analyzing the data collected from 287 copies of survey with the structural equation modeling approach. The result showed that all determinants, except Information Security have positive impact on the usage of mobile cloud computing technology. Thus, this study can compliment the limitations of previous research, suggest a new direction to analyze the user's perspective in the related research on mobile cloud and build a theoretical foundation for the further development of mobile cloud.

A Method for Automatic Provision of Personalized Community Service using Situation based Self-growing User Model (자가 성장하는 상황 기반 사용자 모델을 이용한 개인화 커뮤니티 서비스 자동 제공 방법)

  • Lee, Chang-Yeul;Cho, Kyoo-Chan;Kim, Hyeon-Sook;Cho, We-Duke
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.7
    • /
    • pp.738-742
    • /
    • 2008
  • The user model is an indispensable factor for providing users with personalized. services in the ubiquitous computing environment. In general user models, services which users prefer should be described in advance so that the system can recognize and interpret them automatically. Also, user's preferences as to the change of situation are not reflected in general user models due to their ignoring the situation. In this paper, we propose the self-growing user model which learns user experience and the system which automatically provides personalized community services through extracting user preferring services by situation.

U-Learning of 21 Century University Education Paradigm (21세기 대학교육 패러다임의 U-Learning)

  • Park, Chun-Myoug
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.3 no.1
    • /
    • pp.69-75
    • /
    • 2011
  • This paper presents a model of e-learning based on ubiquitous computing configuration. First of all, we survey the advanced e-learning systems for foreign and domestic universities. Next we propose the optimal e-learning model based on ubiquitous computing configuration. The proposed e-learning model as following. we propose the e-learning system's hardware and software configurations, that are server and networking systems. Also, we construct the proposed e-learning systems's services. There are attendance and absence service, class management service, common knowledge service, score processing service, facilities management service, personal management service, personal authorization issue management service, campus guide service, lecture-hall management service. Then we propose the laboratory equipment management service, experimental materials management service etc. The proposed model of e-learning based on ubiquitous computing configuration will be able to contribute to the next generation university educational paradigm.

  • PDF

A Multi-level Perception Security Model Using Virtualization

  • Lou, Rui;Jiang, Liehui;Chang, Rui;Wang, Yisen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5588-5613
    • /
    • 2018
  • Virtualization technology has been widely applied in the area of computer security research that provides a new method for system protection. It has been a hotspot in system security research at present. Virtualization technology brings new risk as well as progress to computer operating system (OS). A multi-level perception security model using virtualization is proposed to deal with the problems of over-simplification of risk models, unreliable assumption of secure virtual machine monitor (VMM) and insufficient integration with virtualization technology in security design. Adopting the enhanced isolation mechanism of address space, the security perception units can be protected from risk environment. Based on parallel perceiving by the secure domain possessing with the same privilege level as VMM, a mechanism is established to ensure the security of VMM. In addition, a special pathway is set up to strengthen the ability of information interaction in the light of making reverse use of the method of covert channel. The evaluation results show that the proposed model is able to obtain the valuable risk information of system while ensuring the integrity of security perception units, and it can effectively identify the abnormal state of target system without significantly increasing the extra overhead.

A Study on Distributed Processing of Big Data and User Authentication for Human-friendly Robot Service on Smartphone (인간 친화적 로봇 서비스를 위한 대용량 분산 처리 기술 및 사용자 인증에 관한 연구)

  • Choi, Okkyung;Jung, Wooyeol;Lee, Bong Gyou;Moon, Seungbin
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.55-61
    • /
    • 2014
  • Various human-friendly robot services have been developed and mobile cloud computing is a real time computing service that allows users to rent IT resources what they want over the internet and has become the new-generation computing paradigm of information society. The enterprises and nations are actively underway of the business process using mobile cloud computing and they are aware of need for implementing mobile cloud computing to their business practice, but it has some week points such as authentication services and distributed processing technologies of big data. Sometimes it is difficult to clarify the objective of cloud computing service. In this study, the vulnerability of authentication services on mobile cloud computing is analyzed and mobile cloud computing model is constructed for efficient and safe business process. We will also be able to study how to process and analyze unstructured data in parallel to this model, so that in the future, providing customized information for individuals may be possible using unstructured data.

A Study on the Application of the LMS and LCMS Based E-Learning in the Cloud Computing Environment (클라우드 컴퓨팅 환경에서LMS와 LCMS기반의 이러닝 적용 방안)

  • Jeong, Hwa-Young;Kim, Eun-Won;Hong, Bong-Hwa
    • 전자공학회논문지 IE
    • /
    • v.47 no.1
    • /
    • pp.56-60
    • /
    • 2010
  • The widespread development of IT, growth of Web 2.0 application, the proliferation of personal hand held devices with access to the internet, and the availability of wireless networks, each have played an important role in creating the cloud computing model. Cloud computing is a business model and new trend of web application technology. The term is often used in the same context as grid computing or utility computing. In the cloud computing environment, we are able to use the same all of hardware resources in the server and share information easily. In this paper, we aimed a study to apply e-learning part to cloud computing environment. For this purpose, we proposed an application of LMS and LCMS based e-learning in the cloud computing environment. So LMS including LCMS connected to data center of cloud computing.

Personal Kiosk : A Mobile Service Model for Ubiquitous Computing Environment (Personal Kiosk : 유비쿼터스 컴퓨팅 환경을 위한 모바일 서비스 모델)

  • Park Jeong-Kyu;Seo Seung-Ho;Kim Yang-Nam;Lee Keung-Hae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.3
    • /
    • pp.170-182
    • /
    • 2006
  • Last few years have seen a rapid increase in research on ubiquitous computing. Ubiquitous computing is often touted as a technology that will make computing available to the user anywhere and anytime. One important problem to be addressed in building such a ubiquitous computing environment is how to manage services and deliver them to the user in an effective manner. This paper presents our model called Personal Kiosk(PK) as a way of solving the problem. PK is a model of ubiquitous service provisioning that enables the user to use desired services anytime and anywhere. The design and implementation of the current PK in the 'Local Area' setting with related technical issues are also presented. A location-sensing technique for indoor users and a personalized service provisioning based on user location and privileges are discussed in detail.

Design & Implementation of Thin-Client Architecture using Server Based Computing (서버 기반 컴퓨팅을 활용한 썬-클라이언트 아키텍쳐 설계 및 구현)

  • Song, Min-Gyu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.5
    • /
    • pp.149-157
    • /
    • 2008
  • In the field of computing service, there is a copernican revolution indebted to development of network & computer technology. Computer system, which is set to mainframe in the 1960's, is advancing torwards to the paradigm of server based computing, so-called thin-client. In thin-client computing, network is the platform which is responsible for transfer of application, so that client execute application installed on server. It is also possible that each system share the computing resource connected with network. In this parer, we suggest component & distributed computing technology as a measn for the implementation of thin-client architecture hence, make the best use of COM(Component Object Model and PYRO(PYthon Remote Objects). We talk about the concept and mechanism of thin-client at the beginning, and propose the design of network architecture for the implementation thin-client.

  • PDF

Mitigating Threats and Security Metrics in Cloud Computing

  • Kar, Jayaprakash;Mishra, Manoj Ranjan
    • Journal of Information Processing Systems
    • /
    • v.12 no.2
    • /
    • pp.226-233
    • /
    • 2016
  • Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.