• Title/Summary/Keyword: network computing

Search Result 3,180, Processing Time 0.026 seconds

A New Approach to Web Data Mining Based on Cloud Computing

  • Zhu, Wenzheng;Lee, Changhoon
    • Journal of Computing Science and Engineering
    • /
    • v.8 no.4
    • /
    • pp.181-186
    • /
    • 2014
  • Web data mining aims at discovering useful knowledge from various Web resources. There is a growing trend among companies, organizations, and individuals alike of gathering information through Web data mining to utilize that information in their best interest. In science, cloud computing is a synonym for distributed computing over a network; cloud computing relies on the sharing of resources to achieve coherence and economies of scale, similar to a utility over a network, and means the ability to run a program or application on many connected computers at the same time. In this paper, we propose a new system framework based on the Hadoop platform to realize the collection of useful information of Web resources. The system framework is based on the Map/Reduce programming model of cloud computing. We propose a new data mining algorithm to be used in this system framework. Finally, we prove the feasibility of this approach by simulation experiment.

Resource Management Strategies in Fog Computing Environment -A Comprehensive Review

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.310-328
    • /
    • 2022
  • Internet of things (IoT) has emerged as the most popular technique that facilitates enhancing humans' quality of life. However, most time sensitive IoT applications require quick response time. So, processing these IoT applications in cloud servers may not be effective. Therefore, fog computing has emerged as a promising solution that addresses the problem of managing large data bandwidth requirements of devices and quick response time. This technology has resulted in processing a large amount of data near the data source compared to the cloud. However, efficient management of computing resources involving balancing workload, allocating resources, provisioning resources, and scheduling tasks is one primary consideration for effective computing-based solutions, specifically for time-sensitive applications. This paper provides a comprehensive review of the source management strategies considering resource limitations, heterogeneity, unpredicted traffic in the fog computing environment. It presents recent developments in the resource management field of the fog computing environment. It also presents significant management issues such as resource allocation, resource provisioning, resource scheduling, task offloading, etc. Related studies are compared indifferent mentions to provide promising directions of future research by fellow researchers in the field.

A Novel Methodology for Auditing the Threats in Cloud Computing - A Perspective based on Cloud Storage

  • Nasreen Sultana Quadri;Kusum Yadav;Yogesh Kumar Sharma
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.124-128
    • /
    • 2024
  • Cloud computing is a technology for delivering information in which resources are retrieved from the internet through a web-based tools and applications, rather than a direct connection with the server. It is a new emerging computing based technology in which any individual or organization can remotely store or access the information. The structure of cloud computing allows to store and access various information as long as an electronic device has access to the web. Even though various merits are provided by the cloud from the cloud provides to cloud users, it suffers from various flaws in security. Due to these flaws, data integrity and confidentiality has become a challenging task for both the storage and retrieval process. This paper proposes a novel approach for data protection by an improved auditing based methodology in cloud computing especially in the process of cloud storage. The proposed methodology is proved to be more efficient in auditing the threats while storing data in the cloud computing architecture.

The Impact of Social Network Service, Trust and Cognition on Customer Loyalty in Internet Shopping

  • Sun, Han-Gil
    • Journal of Information Management
    • /
    • v.42 no.2
    • /
    • pp.211-234
    • /
    • 2011
  • The development of information technology improves the globalization of the world economy. This change was able to expand the cyber space, and the online community known as the cyber community is made within the existing offline community. From the cyber community's activity, the concept of social network services created, and recently developed social computing. Social computing is the current situation and the next step in the online community. Currently, most CIOs are using social computing for workplace empowerment. As online transactions become more active, the strategy to increase customer loyalty in Internet shopping is an effective tool to increase profit for the company, and as a method to maintain competitive. With the growth of electronic commerce, through insurance of customer loyalty on the Internet, a company can establish a long-term relationship with customers, so for this, it is important to have reliable relationship with customers. Also, through advertisement and commercial information, the cognition of Internet shopping looks can be effective in retaining customers. In this study, it explores how social computing and trust and cognition of Internet shopping are effective in maintaining customer loyalty. As the result of study, the trust and cognition of Internet shopping are significantly effective on customer loyalty, but the sense of social computing. Still, social computing has not matured enough to be as effective in retaining customer loyalty. However, it does indicate that social computing has significantly increased the trust and cognition in Internet shopping. In this study, as the concepts of the social network service and social computing are applied in Internet shopping, which are actively discussed by scholars, it is expected that the basis of the study could improve and present the idea of social shopping.

Implementation of Context-Aware Middleware for Sensor Network in Ubiquitous Environment

  • Kim Bo-Seong;Lee Byoung-Hoon;Kim Jai-Hoon
    • International Journal of Contents
    • /
    • v.2 no.1
    • /
    • pp.9-16
    • /
    • 2006
  • Recently many researches are investigating for ubiquitous computing and network. In the real world many sensor devices must be equipped to provide many services for users. To make computing environment easy and more user friendly, middleware system not only hides all complexities (network, system, services, etc), but also needs to have efficient context inference scheme and system reconfiguration capability. In this paper we suggest context-aware middleware design for sensor network which provides efficient computing environment for end-users. We also present XML based implementation of our system.

  • PDF

Resource Management in 5G Mobile Networks: Survey and Challenges

  • Chien, Wei-Che;Huang, Shih-Yun;Lai, Chin-Feng;Chao, Han-Chieh
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.896-914
    • /
    • 2020
  • With the rapid growth of network traffic, a large number of connected devices, and higher application services, the traditional network is facing several challenges. In addition to improving the current network architecture and hardware specifications, effective resource management means the development trend of 5G. Although many existing potential technologies have been proposed to solve the some of 5G challenges, such as multiple-input multiple-output (MIMO), software-defined networking (SDN), network functions virtualization (NFV), edge computing, millimeter-wave, etc., research studies in 5G continue to enrich its function and move toward B5G mobile networks. In this paper, focusing on the resource allocation issues of 5G core networks and radio access networks, we address the latest technological developments and discuss the current challenges for resource management in 5G.

An Application of MapReduce Technique over Peer-to-Peer Network (P2P 네트워크상에서 MapReduce 기법 활용)

  • Ren, Jian-Ji;Lee, Jae-Kee
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.8
    • /
    • pp.586-590
    • /
    • 2009
  • The objective of this paper describes the design of MapReduce over Peer-to-Peer network for dynamic environments applications. MapReduce is a software framework used for Cloud Computing which processing large data sets in a highly-parallel way. Based on the Peer-to-Peer network character which node failures will happen anytime, we focus on using a DHT routing protocol which named Pastry to handle the problem of node failures. Our results are very promising and indicate that the framework could have a wide application in P2P network systems while maintaining good computational efficiency and scalability. We believe that, P2P networks and parallel computing emerge as very hot research and development topics in industry and academia for many years to come.

Service Deployment Strategy for Customer Experience and Cost Optimization under Hybrid Network Computing Environment

  • Ning Wang;Huiqing Wang;Xiaoting Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3030-3049
    • /
    • 2023
  • With the development and wide application of hybrid network computing modes like cloud computing, edge computing and fog computing, the customer service requests and the collaborative optimization of various computing resources face huge challenges. Considering the characteristics of network environment resources, the optimized deployment of service resources is a feasible solution. So, in this paper, the optimal goals for deploying service resources are customer experience and service cost. The focus is on the system impact of deploying services on load, fault tolerance, service cost, and quality of service (QoS). Therefore, the alternate node filtering algorithm (ANF) and the adjustment factor of cost matrix are proposed in this paper to enhance the system service performance without changing the minimum total service cost, and corresponding theoretical proof has been provided. In addition, for improving the fault tolerance of system, the alternate node preference factor and algorithm (ANP) are presented, which can effectively reduce the probability of data copy loss, based on which an improved cost-efficient replica deployment strategy named ICERD is given. Finally, by simulating the random occurrence of cloud node failures in the experiments and comparing the ICERD strategy with representative strategies, it has been validated that the ICERD strategy proposed in this paper not only effectively reduces customer access latency, meets customers' QoS requests, and improves system service quality, but also maintains the load balancing of the entire system, reduces service cost, enhances system fault tolerance, which further confirm the effectiveness and reliability of the ICERD strategy.

A Study on Data Movement Method between For for Cloud Computing (클라우드를 위한 포그 간의 데이터 이동 기법에 관한 연구)

  • Hwang, Chi-Gon;Yoon, Chang-Pyo;Lee, Hae-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.294-296
    • /
    • 2017
  • Cloud computing is a computing technique that uploads all the data from a cloud node to a cloud server and provides it to users as a service. This is difficult to provide services in real time depending on the network conditions. This is because it is necessary to download information to the remote site through the network, not the local area, and to download additional services to provide services in the cloud. So fog computing has been proposed as an alternative. In this paper, we propose an efficient data exchange technique between cloud, fog and user. The proposed fog provides services to users and collects and processes data. The cloud is responsible for the flow of data exchange and control between the fog. We propose a standard method for data exchange. The application for this is to process and service the information generated by the BAN (Body Area Network) in the fog, and the cloud serves as a mediator. This can resolve data heterogeneity between devices or services and provide efficient data movement.

  • PDF

A Qualitative Research on the Structure and Determinants of Personal Device Network in the Ubiquitous Computing Context (유비쿼터스 컴퓨팅 환경에서 PDN의 구조와 결정 요인에 대한 정성적 연구)

  • Jeon Seok-Won;Jang Youn-Sun;Kim Jin-Woo
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.3
    • /
    • pp.1-28
    • /
    • 2006
  • In the ubiquitous computing environments. people usually carry multiple information technology devices with them. Personal device network (PDN) refers to the way how people connect multiple IT devices for their personal as well as professional purposes. Even though it has been Quite popular to construct the PDN in ubiquitous computing context, not much research has been conducted on how people actually connected multiple devices and what influences their methods of connection. In this paper we conducted a content analysis on community bulletin boards of IT devices and a contextual inquiry with expert users of PDN for investigating the configurations with which users connect multiple IT devices. Base on the results of two related studies, we identified three major types of PDN configurations, and key factors that influence the configurations of PDN. We conclude this research with guidelines to design a set of devices for each of the three configuration types.

  • PDF