• 제목/요약/키워드: network computing

검색결과 3,180건 처리시간 0.029초

Scalable Service Placement in the Fog Computing Environment for the IoT-Based Smart City

  • Choi, Jonghwa;Ahn, Sanghyun
    • Journal of Information Processing Systems
    • /
    • 제15권2호
    • /
    • pp.440-448
    • /
    • 2019
  • The Internet of Things (IoT) is one of the main enablers for situation awareness needed in accomplishing smart cities. IoT devices, especially for monitoring purposes, have stringent timing requirements which may not be met by cloud computing. This deficiency of cloud computing can be overcome by fog computing for which fog nodes are placed close to IoT devices. Because of low capabilities of fog nodes compared to cloud data centers, fog nodes may not be deployed with all the services required by IoT devices. Thus, in this article, we focus on the issue of fog service placement and present the recent research trends in this issue. Most of the literature on fog service placement deals with determining an appropriate fog node satisfying the various requirements like delay from the perspective of one or more service requests. In this article, we aim to effectively place fog services in accordance with the pre-obtained service demands, which may have been collected during the prior time interval, instead of on-demand service placement for one or more service requests. The concept of the logical fog network is newly presented for the sake of the scalability of fog service placement in a large-scale smart city. The logical fog network is formed in a tree topology rooted at the cloud data center. Based on the logical fog network, a service placement approach is proposed so that services can be placed on fog nodes in a resource-effective way.

Trusted and Transparent Blockchain-based Land Registration System

  • Fatmah Bayounis;Sana Dehlavi;Asmaa Azimudin;Taif Alghamdi;Aymen Akremi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권10호
    • /
    • pp.214-224
    • /
    • 2023
  • Fraudulence, cheating, and deception can occur in the commercial real estate (CRE) industry, besides the difficulty in searching for and transferring properties while ensuring the operation is processed through an authoritative source in a trusted manner. Nowadays, real estate transactions use neutral third parties to sell land. Indeed, properties can be sold by the owners or third parties multiple times or without a proper deed. Moreover, third parties request a large amount of money to mediate between the seller and buyer. Methods: We propose a new framework that uses a private blockchain network and predefined BPMN instances to enable the fast and easy recording of deeds and their proprietary transfer management controlled by the government. The blockchain allows for multiple verifications of transactions by permitted parties called peers. It promotes transparency, privacy, trust, and commercial competition. Results: We demonstrated the easy adoption of blockchain for land registration and transfer. The paper presents a prototype of the implemented product that follows the proposed framework. Conclusion: The use of Blockchain-based solutions to resolve the current land registration and transfer issues is promising and will contribute to smart cities and digital governance.

Enhancement of Semantic Interoper ability in Healthcare Systems Using IFCIoT Architecture

  • Sony P;Siva Shanmugam G;Sureshkumar Nagarajan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권4호
    • /
    • pp.881-902
    • /
    • 2024
  • Fast decision support systems and accurate diagnosis have become significant in the rapidly growing healthcare sector. As the number of disparate medical IoT devices connected to the human body rises, fast and interrelated healthcare data retrieval gets harder and harder. One of the most important requirements for the Healthcare Internet of Things (HIoT) is semantic interoperability. The state-of-the-art HIoT systems have problems with bandwidth and latency. An extension of cloud computing called fog computing not only solves the latency problem but also provides other benefits including resource mobility and on-demand scalability. The recommended approach helps to lower latency and network bandwidth consumption in a system that provides semantic interoperability in healthcare organizations. To evaluate the system's language processing performance, we simulated it in three different contexts. 1. Polysemy resolution system 2. System for hyponymy-hypernymy resolution with polysemy 3. System for resolving polysemy, hypernymy, hyponymy, meronymy, and holonymy. In comparison to the other two systems, the third system has lower latency and network usage. The proposed framework can reduce the computation overhead of heterogeneous healthcare data. The simulation results show that fog computing can reduce delay, network usage, and energy consumption.

유비쿼터스 환경의 교실 공간 계획에 관한 기초적 연구 (A Fundamental Study on the Planning of Classroom Space in the Ubiquitous Environments)

  • 조현호;이재훈
    • 교육시설
    • /
    • 제14권4호
    • /
    • pp.4-13
    • /
    • 2007
  • In 21st century, mankind greets an era of ubiquitous computing where physical and virtual space are merged through the innovation of digital and IT(Information Technology), meanwhile ubiquitous computing and network paradigm suggest a new direction which our future educational system should head for. A society where people, computers, and objects can be connected with each other anytime and anywhere, that is, a society of ubiquitous computing where everything in our living space are interconnected by a immense network system may bring a variety of changes into our educational environment in schools. In this study I analysed the forecast of school educational orientation and ubiquitous educational environment and facilities in developed countries, and on the basis of the result, I performed a fundamental work for formation of a ubiquitous classroom environment which is feasible in Korea. In the section of conclusion, I present a model of ubiquitous classroom as a scenario based on ubiquitous computing technology applicable to future classroom environment.

유비쿼터스 디바이스 기술동향과 연구실태에 관한 조사 (A Study on Technology Trends and Researches for Ubiquitous Devices)

  • 진태석
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2008년도 추계종합학술대회 B
    • /
    • pp.836-841
    • /
    • 2008
  • 21세기를 들어서면서 본격적으로 차세대 IT패러다임으로 등장한 유비쿼터스(Ubiquitous) 분야는 정보기술의 패러다임이 PC와 인터넷 중심에서 유비쿼터스로 이동하면서 미래 유비쿼터스 시장을 선점하기 위한 세계 주요국가와 IT기업들이 치열한 전쟁터로 인식되고 있다. 본 연구에서는 유비쿼터스 디바이스에 관련된 국내외 기술 및 연구동향을 알아보고, 유비 쿼터스 사회의 진화에 따른 미래효과와 그에 따른 연구방향 등을 살펴보도록 한다.

  • PDF

유비쿼터스 컴퓨팅 환경에서의 스트림 암호 설계 고찰 (A Study on the Design Concept of Stream Cipher Algorithm in Ubiquitous Computing)

  • 김화영;김은홍
    • 한국IT서비스학회지
    • /
    • 제3권1호
    • /
    • pp.101-115
    • /
    • 2004
  • The phrase "Ubiquitous Computing" has become popular ever since Mark Weiser used it in an article. It is to realize a computerized environment in which small computers are embedded and cooperate with each other. This environment will support many activities of our daily life. In a Ubiquitous Computing environment, various devices will be connected to the network from houses and buildings. Therefore it is necessary to ensure network security and to protect private data from tapping, falsification and the disguising of identity by others. This study reviews the Ubiquitous Computing technologies in detail and outlines the design concept of the Stream Cipher Algorithm.

Blockchain based Application to Electric Vehicle in IoT environment

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Song, You-Jin
    • International Journal of Advanced Culture Technology
    • /
    • 제10권2호
    • /
    • pp.233-239
    • /
    • 2022
  • Recently, research is being conducted on the rapid service provision and reliability of the instance-based rather than the existing IP-based structure. Research is mainly conducted through Block cloud, a platform that combines service-centric networking (SCN) and blockchain. In addition, the Internet of Things network has been proposed as a fog computing environment in the structure of the existing cloud computing. Fog computing is an environment suitable for real-time information processing. In this paper, we propose a new Internet network structure based on fog computing that requires real-time for rapid processing of IoT services. The proposed system applies IoTA, the third-generation blockchain based on DAG, to the block cloud. In addition, we want to propose a basic model of the object block chain and check the application services of electric vehicles.

THE USE OF MOBILE COMPUTERS FOR CONSTRUCTION PROJECTS

  • Chul S. Kim
    • 국제학술발표논문집
    • /
    • The 3th International Conference on Construction Engineering and Project Management
    • /
    • pp.956-961
    • /
    • 2009
  • When construction engineers perform their work in the jobsite, they have to record as-built conditions in the project log (Data Collection). On the other hand, the engineers often have to refer to the construction documents when necessary at the job faces (Data Access). The practice of Data Collection and Data Access in the jobsite can be greatly enhanced by utilizing mobile computing with wireless communications. In this paper, two cases of mobile computing applications for construction field management are presented; Mobile Specifications System and Mobile Data Collection System. The demonstration of the process for developing two mobile applications is the primary purpose of the paper. The problems and issues involved with adopting mobile computing for construction field are also presented. The simple information framework for mobile computing has been also proposed as an outcome of the research. As for development tools, readily available relational database and wireless network have been used. The use of commercial mobile broadband was examined for data communication where local area network is not available.

  • PDF

Injection of Cultural-based Subjects into Stable Diffusion Image Generative Model

  • Amirah Alharbi;Reem Alluhibi;Maryam Saif;Nada Altalhi;Yara Alharthi
    • International Journal of Computer Science & Network Security
    • /
    • 제24권2호
    • /
    • pp.1-14
    • /
    • 2024
  • While text-to-image models have made remarkable progress in image synthesis, certain models, particularly generative diffusion models, have exhibited a noticeable bias to- wards generating images related to the culture of some developing countries. This paper introduces an empirical investigation aimed at mitigating the bias of image generative model. We achieve this by incorporating symbols representing Saudi culture into a stable diffusion model using the Dreambooth technique. CLIP score metric is used to assess the outcomes in this study. This paper also explores the impact of varying parameters for instance the quantity of training images and the learning rate. The findings reveal a substantial reduction in bias-related concerns and propose an innovative metric for evaluating cultural relevance.

모바일 서비스에 기반한 유비쿼터스 컴퓨팅의 사용자 수용에 영향을 미치는 요인 (Factors Affecting User Acceptance of Ubiquitous Computing based on Mobile Services)

  • 노미진;김병곤;박순창
    • Journal of Information Technology Applications and Management
    • /
    • 제18권1호
    • /
    • pp.55-74
    • /
    • 2011
  • The growth in the use of ubiquitous computing based on mobile services as an enabler to conduct business more effectively has been phenomenal. Technology acceptance model (TAM) has been applied in different contexts to examine a wide range of information technologies (IT). As more and more companies are finding ways to utilize ubiquitous computing based on mobile services, an important issue is to understand what factors will impact the decisions of consumers in adopting the services. Based on TAM with three additional groups of external factors, i.e., service-related factors (ubiquitous access, context awareness) and technology-related factors (perceived security risk, network connectivity) that are theoretically justified as having influence on both perceived usefulness and perceived ease of use which are additionally considered, a research model for the investigated technology acceptance was developed and empirically examined, using responses from more than intended users of ubiquitous computing based on mobile services. The specific purposes of this study are as follows. Firstly, this study is to identify service beliefs considering unique characteristics for ubiquitous services such as perceived ubiquitous access and perceived context awareness. Secondly, this study is to investigate network characteristics beliefs such as perceived security and perceived connectivity. Thirdly, this paper investigates the relationship among variables such as ubiquitous characteristics, network characteristics, behavioral beliefs, and intention to use ubiquitous web services. This study uses a structural equation model to test the research model. The major results of this study are as follows. Firstly, ubiquitous access has a influence on perceived usefulness and perceived ease of use. Context awareness has an influence on perceived usefulness. Secondly, User familiarity has an influence on perceived usefulness and perceived ease of use, and intention to use. User innovativeness has an influence on perceived ease of use. Thirdly, perceived security risk has an influence on perceived usefulness and perceived ease of use. Network connectivity has an influence on perceived usefulness and perceived ease of use. Fourth, there exist differential effects among factors in structural model among information, transaction, and entertainment services.