• Title/Summary/Keyword: one-to-one computing

Search Result 2,208, Processing Time 0.027 seconds

Testing Implementation of Remote Sensing Image Analysis Processing Service on OpenStack of Open Source Cloud Platform (오픈소스 클라우드 플랫폼 OpenStack 기반 위성영상분석처리 서비스 시험구현)

  • Kang, Sang-Goo;Lee, Ki-Won
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.16 no.4
    • /
    • pp.141-152
    • /
    • 2013
  • The applications and concerned technologies of cloud computing services, one of major trends in the information communication technology, are widely progressing and advancing. OpenStack, one of open source cloud computing platforms, is comprised of several service components; using these, it can be possible to build public or private cloud computing service for a given target application. In this study, a remote sensing image analysis processing service on cloud computing environment has designed and implemented as an operational test application in the private cloud computing environment based on OpenStack. The implemented service is divided into instance server, web service, and mobile app. A instance server provides remote sensing image processing and database functions, and the web service works for storage and management of remote sensing image from user sides. The mobile app provides functions for remote sensing images visualization and some requests.

A Performance Comparison between XEN and KVM Hypervisors While Using Cryptographic Algorithms

  • Mohammed Al-Shalabi;Waleed K. Abdulraheem;Jafar Ababneh;Nader Abdel Karim
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.61-70
    • /
    • 2024
  • Cloud Computing is internet-based computing, where the users are provided with whatever service they need from the resources, software, and information. Recently, the security of cloud computing is considered as one of the major issues for both cloud service providers CSP and end-users. Privacy and highly confidential data make many users refuse to store their data within cloud computing, since data on cloud computing is not dully secured. The cryptographic algorithm is a technique which is used to maintain the security and privacy of the data on the cloud. In this research, we applied eight different cryptographic algorithms on Xen and KVM as hypervisors on cloud computing, to be able to measure and compare the performance of the two hypervisors. Response time and CPU utilization while encryption and decryption have been our aspects to measure the performance. In terms of response time and CPU utilization, results show that KVM is more efficient than Xen on average at 11.5% and 11% respectively. While TripleDES cryptographic algorithm shows a more efficient time response at Xen hypervisor than KVM.

Joint Destination-Relay Selection and Antenna Mode Selection in Full-Duplex Relay Network

  • Tang, Yanan;Gao, Hui;Su, Xin;Lv, Tiejun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.2831-2847
    • /
    • 2017
  • In this paper, a joint destination-relay selection and antenna mode selection scheme for full-duplex (FD) relay network is investigated, which consists of one source node, N FD amplify-and-forward (AF) relays and M destination nodes. Multiple antennas are configured at the source node, and beamforming technique is adopted. Two antennas are employed at each relay, one for receiving and the other for transmitting. Only one antenna is equipped at each destination node. In the proposed scheme, the best destination node is firstly selected according to the direct links between the source node and destination nodes. Then the transmit and receive mode of two antennas at each relay is adaptively selected based on the relaying link condition. Meanwhile, the best relay with the optimal Tx/Rx antenna configuration is selected to forward the signals. To characterize the performance of the proposed scheme, the closed-form expression of the outage probability is derived; meanwhile, the simple asymptotic expressions are also obtained. Our analysis shows that the proposed scheme obtains the benefits of multi-relay diversity and multi-destination diversity. Moreover, extra space diversity in the medium SNR region can be achieved due to the antenna selection at the relay. Finally, Monte-Carlo simulations are provided to consolidate the analytical results, and show the effectiveness of the proposed scheme.

Development and Application of Visiting Physical-Computing Experience in an Education Program

  • Lee, Eun-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.279-286
    • /
    • 2022
  • The purpose of this study is to present a case of the development and application of a one-time special lecture program that requires the use of computers in frontline elementary and secondary schools. For this purpose, the researcher developed an Arduino-based special lecture program that works as a teaching tool to help with the functions of a student PC with a Raspberry Pi. This special lecture program was applied at three elementary and middle schools near K-University, and then the program was evaluated. The results of this study are as follows. First, the researcher developed a teaching aid for PC functions to be used in special lectures. Second, teaching and learning materials for visiting special lecture education programs using Arduino were developed. Third, in the special lecture, a teaching-learning method was used to guide a small number of students individually. Fourth, the special lecture program resulted in high satisfaction. The results of this study can be a useful reference for teachers who plan one-time special lecture programs requiring computers or for those who want to apply physical computing-related devices in an educational field.

Design of Cloud-based Context-aware System Based on Falling Type

  • Kwon, TaeWoo;Lee, Jong-Yong;Jung, Kye-Dong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.44-50
    • /
    • 2017
  • To understand whether Falling, which is one of the causes of injuries, occurs, various behavior recognition research is proceeding. However, in most research recognize only the fact that Falling has occurred and provide the service. As well as the occurrence of the Falling, the risk varies greatly based on the type of Falling and the situation before and after the Falling. Therefore, when Falling occurs, it is necessary to infer the user's current situation and provide appropriate services. In this paper, we propose to base on Fog Computing and Cloud Computing to design Context-aware System using analysis of behavior data and process sensor data in real-time. This system solved the problem of increase latency and server overload due to large capacity sensor data.

Applying Workload Shaping Toward Green Cloud Computing

  • Kim, Woongsup
    • International journal of advanced smart convergence
    • /
    • v.1 no.2
    • /
    • pp.12-15
    • /
    • 2012
  • Energy costs for operating and cooling computing resources in Cloud infrastructure have increased significantly up to the point where they would surpass the hardware purchasing costs. Thus, reducing the energy consumption can save a significant amount of management cost. One of major approach is removing hardware over-provisioning. In this paper, we propose a technique that facilitates power saving through reducing resource over provisioning based on virtualization technology. To this end, we use dynamic workload shaping to reschedule and redistribute job requests considering overall power consumption. In this paper, we present our approach to shape workloads dynamically and distribute them on virtual machines and physical machines through virtualization technology. We generated synthetic workload data and evaluated it in simulating and real implementation. Our simulated results demonstrate our approach outperforms to when not using no workload shaping methodology.

Development of Web-based High Throughput Computing Environment and Its Applications (웹기반 대용량 계산환경 구축 및 응용사례)

  • Jeong, Min-Joong;Kim, Byung-Sang
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2007.04a
    • /
    • pp.719-724
    • /
    • 2007
  • Many engineering problems often require the large amount of computing resources for iterative simulations of problems treating many parameters and input files. In order to overcome the situation, this paper proposes an e-Science based computational system. The system exploits the Grid computing technology to establish an integrated web service environment which supports distributed high throughput computational simulations and remote executions. The proposed system provides an easy-to-use parametric study service where a computational service includes real time monitoring. To verify usability of the proposed system, two kinds of applications were introduced. The first application is an Aerospace Integrated Research System (e-AIRS). The e-AIRS adapts the proposed computational system to solve CFD problems. The second one is design and optimization of protein 3-dimensional structures.

  • PDF

A proposed parallel processing structure for robot motion control (로봇 운동 제어의 실시간 연산을 위한 병렬처리구조)

  • 고경철;조형석
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1988.10a
    • /
    • pp.1-5
    • /
    • 1988
  • The realization of high quality robot control needs the improvement of computing speed of controller. In this paper, parallel processing method is considered for this purpose. A S/W algorithm for task scheduling is developed first, and then, an appropriate H/W structure is proposed. This scheme is applied to calculate inverse kinematics of PUMA robot. The simulation results show that the computing time when using three 8086/87's is reduced to 4.23 msec compared to 10 msec in case using one 8086/87.

  • PDF

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.

Proactive Friend Recommendation Method using Social Network in Pervasive Computing Environment (퍼베이시브 컴퓨팅 환경에서 소셜네트워크를 이용한 프로액티브 친구 추천 기법)

  • Kwon, Joon Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.43-52
    • /
    • 2013
  • Pervasive computing and social network are good resources in recommendation method. Collaborative filtering is one of the most popular recommendation methods, but it has some limitations such as rating sparsity. Moreover, it does not consider social network in pervasive computing environment. We propose an effective proactive friend recommendation method using social network and contexts in pervasive computing environment. In collaborative filtering method, users need to rate sufficient number of items. However, many users don't rate items sufficiently, because the rating information must be manually input into system. We solve the rating sparsity problem in the collaboration filtering method by using contexts. Our method considers both a static and a dynamic friendship using contexts and social network. It makes more effective recommendation. This paper describes a new friend recommendation method and then presents a music friend scenario. Our work will help e-commerce recommendation system using collaborative filtering and friend recommendation applications in social network services.