• 제목/요약/키워드: network computing

검색결과 3,181건 처리시간 0.026초

A New Approach to Web Data Mining Based on Cloud Computing

  • Zhu, Wenzheng;Lee, Changhoon
    • Journal of Computing Science and Engineering
    • /
    • 제8권4호
    • /
    • pp.181-186
    • /
    • 2014
  • Web data mining aims at discovering useful knowledge from various Web resources. There is a growing trend among companies, organizations, and individuals alike of gathering information through Web data mining to utilize that information in their best interest. In science, cloud computing is a synonym for distributed computing over a network; cloud computing relies on the sharing of resources to achieve coherence and economies of scale, similar to a utility over a network, and means the ability to run a program or application on many connected computers at the same time. In this paper, we propose a new system framework based on the Hadoop platform to realize the collection of useful information of Web resources. The system framework is based on the Map/Reduce programming model of cloud computing. We propose a new data mining algorithm to be used in this system framework. Finally, we prove the feasibility of this approach by simulation experiment.

Resource Management Strategies in Fog Computing Environment -A Comprehensive Review

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.310-328
    • /
    • 2022
  • Internet of things (IoT) has emerged as the most popular technique that facilitates enhancing humans' quality of life. However, most time sensitive IoT applications require quick response time. So, processing these IoT applications in cloud servers may not be effective. Therefore, fog computing has emerged as a promising solution that addresses the problem of managing large data bandwidth requirements of devices and quick response time. This technology has resulted in processing a large amount of data near the data source compared to the cloud. However, efficient management of computing resources involving balancing workload, allocating resources, provisioning resources, and scheduling tasks is one primary consideration for effective computing-based solutions, specifically for time-sensitive applications. This paper provides a comprehensive review of the source management strategies considering resource limitations, heterogeneity, unpredicted traffic in the fog computing environment. It presents recent developments in the resource management field of the fog computing environment. It also presents significant management issues such as resource allocation, resource provisioning, resource scheduling, task offloading, etc. Related studies are compared indifferent mentions to provide promising directions of future research by fellow researchers in the field.

A Novel Methodology for Auditing the Threats in Cloud Computing - A Perspective based on Cloud Storage

  • Nasreen Sultana Quadri;Kusum Yadav;Yogesh Kumar Sharma
    • International Journal of Computer Science & Network Security
    • /
    • 제24권2호
    • /
    • pp.124-128
    • /
    • 2024
  • Cloud computing is a technology for delivering information in which resources are retrieved from the internet through a web-based tools and applications, rather than a direct connection with the server. It is a new emerging computing based technology in which any individual or organization can remotely store or access the information. The structure of cloud computing allows to store and access various information as long as an electronic device has access to the web. Even though various merits are provided by the cloud from the cloud provides to cloud users, it suffers from various flaws in security. Due to these flaws, data integrity and confidentiality has become a challenging task for both the storage and retrieval process. This paper proposes a novel approach for data protection by an improved auditing based methodology in cloud computing especially in the process of cloud storage. The proposed methodology is proved to be more efficient in auditing the threats while storing data in the cloud computing architecture.

The Impact of Social Network Service, Trust and Cognition on Customer Loyalty in Internet Shopping

  • Sun, Han-Gil
    • 정보관리연구
    • /
    • 제42권2호
    • /
    • pp.211-234
    • /
    • 2011
  • The development of information technology improves the globalization of the world economy. This change was able to expand the cyber space, and the online community known as the cyber community is made within the existing offline community. From the cyber community's activity, the concept of social network services created, and recently developed social computing. Social computing is the current situation and the next step in the online community. Currently, most CIOs are using social computing for workplace empowerment. As online transactions become more active, the strategy to increase customer loyalty in Internet shopping is an effective tool to increase profit for the company, and as a method to maintain competitive. With the growth of electronic commerce, through insurance of customer loyalty on the Internet, a company can establish a long-term relationship with customers, so for this, it is important to have reliable relationship with customers. Also, through advertisement and commercial information, the cognition of Internet shopping looks can be effective in retaining customers. In this study, it explores how social computing and trust and cognition of Internet shopping are effective in maintaining customer loyalty. As the result of study, the trust and cognition of Internet shopping are significantly effective on customer loyalty, but the sense of social computing. Still, social computing has not matured enough to be as effective in retaining customer loyalty. However, it does indicate that social computing has significantly increased the trust and cognition in Internet shopping. In this study, as the concepts of the social network service and social computing are applied in Internet shopping, which are actively discussed by scholars, it is expected that the basis of the study could improve and present the idea of social shopping.

Implementation of Context-Aware Middleware for Sensor Network in Ubiquitous Environment

  • Kim Bo-Seong;Lee Byoung-Hoon;Kim Jai-Hoon
    • International Journal of Contents
    • /
    • 제2권1호
    • /
    • pp.9-16
    • /
    • 2006
  • Recently many researches are investigating for ubiquitous computing and network. In the real world many sensor devices must be equipped to provide many services for users. To make computing environment easy and more user friendly, middleware system not only hides all complexities (network, system, services, etc), but also needs to have efficient context inference scheme and system reconfiguration capability. In this paper we suggest context-aware middleware design for sensor network which provides efficient computing environment for end-users. We also present XML based implementation of our system.

  • PDF

Resource Management in 5G Mobile Networks: Survey and Challenges

  • Chien, Wei-Che;Huang, Shih-Yun;Lai, Chin-Feng;Chao, Han-Chieh
    • Journal of Information Processing Systems
    • /
    • 제16권4호
    • /
    • pp.896-914
    • /
    • 2020
  • With the rapid growth of network traffic, a large number of connected devices, and higher application services, the traditional network is facing several challenges. In addition to improving the current network architecture and hardware specifications, effective resource management means the development trend of 5G. Although many existing potential technologies have been proposed to solve the some of 5G challenges, such as multiple-input multiple-output (MIMO), software-defined networking (SDN), network functions virtualization (NFV), edge computing, millimeter-wave, etc., research studies in 5G continue to enrich its function and move toward B5G mobile networks. In this paper, focusing on the resource allocation issues of 5G core networks and radio access networks, we address the latest technological developments and discuss the current challenges for resource management in 5G.

P2P 네트워크상에서 MapReduce 기법 활용 (An Application of MapReduce Technique over Peer-to-Peer Network)

  • 임건길;이재기
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제15권8호
    • /
    • pp.586-590
    • /
    • 2009
  • 본 논문의 목적은 P2P 네트워크 상에서 동적 환경 애플리케이션을 지원하기 위한 MapReduce 의 설계이다. MapReduce는 클라우드컴퓨팅 중에서 대용량 데이터의 병렬처리를 위해서 개발된 소프트웨어 프레임워크이다. P2P 기반 네트워크의 특징은 노드 고장이 언제든지 발생할 수 있으며, 이런 노드 고장을 제어하기 위해 Pastry라는 DHT 라우팅 프로토콜의 사용에 초점을 맞추었다. 본 논문의 결과는 프레임워크가 양호한 계산 효율과 확장성을 유지하는 가운데 P2P 네트워크 시스템의 다양한 애플리케이션에 적용될 수 있음을 보이고 있다. 향후 몇 년 동안은 P2P 네트워크와 병렬 컴퓨팅이 산업과 학계에서 매우 중요한 연구 및 개발 주제로 자리 잡을 것으로 확신한다.

Service Deployment Strategy for Customer Experience and Cost Optimization under Hybrid Network Computing Environment

  • Ning Wang;Huiqing Wang;Xiaoting Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권11호
    • /
    • pp.3030-3049
    • /
    • 2023
  • With the development and wide application of hybrid network computing modes like cloud computing, edge computing and fog computing, the customer service requests and the collaborative optimization of various computing resources face huge challenges. Considering the characteristics of network environment resources, the optimized deployment of service resources is a feasible solution. So, in this paper, the optimal goals for deploying service resources are customer experience and service cost. The focus is on the system impact of deploying services on load, fault tolerance, service cost, and quality of service (QoS). Therefore, the alternate node filtering algorithm (ANF) and the adjustment factor of cost matrix are proposed in this paper to enhance the system service performance without changing the minimum total service cost, and corresponding theoretical proof has been provided. In addition, for improving the fault tolerance of system, the alternate node preference factor and algorithm (ANP) are presented, which can effectively reduce the probability of data copy loss, based on which an improved cost-efficient replica deployment strategy named ICERD is given. Finally, by simulating the random occurrence of cloud node failures in the experiments and comparing the ICERD strategy with representative strategies, it has been validated that the ICERD strategy proposed in this paper not only effectively reduces customer access latency, meets customers' QoS requests, and improves system service quality, but also maintains the load balancing of the entire system, reduces service cost, enhances system fault tolerance, which further confirm the effectiveness and reliability of the ICERD strategy.

클라우드를 위한 포그 간의 데이터 이동 기법에 관한 연구 (A Study on Data Movement Method between For for Cloud Computing)

  • 황치곤;윤창표;이해준
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2017년도 춘계학술대회
    • /
    • pp.294-296
    • /
    • 2017
  • 클라우드 컴퓨팅은 클라우드 노드에서 발생하는 모든 데이터를 클라우드 서버에 업로드하여, 서비스로서 사용자에게 제공하는 역할을 수행하는 컴퓨팅 기법이다. 이는 네트워크의 상황에 따라 실시간으로 서비스를 제공하기에는 어렵다. 그것은 로컬의 영역이 아니라 네트워크를 통하여 원격지로 정보를 전송하고, 클라우드에서 서비스를 제공하기 위해 추가적으로 다운로드를 해야 하기 때문이다. 이에 대한 대안으로 포그 컴퓨팅이 제안되었다. 본 논문에서는 클라우드, 포그 그리고 사용자 간의 효율적인 데이터 교환 기법을 제안하고자 한다. 제안된 포그는 사용자에게 서비스를 제공하고, 데이터를 수집하여 처리하도록 한다. 클라우드는 포그 간의 데이터 교환과 제어의 흐름을 담당하도록 한다. 우리는 이에 대한 데이터의 교환에 필요한 표준 방식을 제안한다. 이를 위한 적용은 BAN(Body Area Network)에서 발생하는 정보를 포그에서 처리 및 서비스를 하고, 클라우드는 중재 역할을 수행하는 시스템으로 한다. 이는 기기 또는 서비스 간에서 발생하는 데이터 이질성을 해결하고, 효율적인 데이터 이동을 제공할 수 있다.

  • PDF

유비쿼터스 컴퓨팅 환경에서 PDN의 구조와 결정 요인에 대한 정성적 연구 (A Qualitative Research on the Structure and Determinants of Personal Device Network in the Ubiquitous Computing Context)

  • 전석원;장윤선;김진우
    • Journal of Information Technology Applications and Management
    • /
    • 제13권3호
    • /
    • pp.1-28
    • /
    • 2006
  • In the ubiquitous computing environments. people usually carry multiple information technology devices with them. Personal device network (PDN) refers to the way how people connect multiple IT devices for their personal as well as professional purposes. Even though it has been Quite popular to construct the PDN in ubiquitous computing context, not much research has been conducted on how people actually connected multiple devices and what influences their methods of connection. In this paper we conducted a content analysis on community bulletin boards of IT devices and a contextual inquiry with expert users of PDN for investigating the configurations with which users connect multiple IT devices. Base on the results of two related studies, we identified three major types of PDN configurations, and key factors that influence the configurations of PDN. We conclude this research with guidelines to design a set of devices for each of the three configuration types.

  • PDF