• Title/Summary/Keyword: resource-limited environments

Search Result 72, Processing Time 0.022 seconds

Customized Resource Collaboration System based on Ontology and User Model in Resource Sharing Environments

  • Park, Jong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.4
    • /
    • pp.107-114
    • /
    • 2018
  • Recently, various wearable personal devices such as a smart watch have been developed and these personal devices are being miniaturized. The user desires to receive new services from personal devices as well as services that have been received from personal computers, anytime and anywhere. However, miniaturization of devices involves constraints on resources such as limited input and output and insufficient power. In order to solve these resource constraints, this paper proposes a resource collaboration system which provides a service by composing sharable resources in the resource sharing environment like IoT. the paper also propose a method to infer and recommend user-customized resources among various sharable resources. For this purpose, the paper defines an ontology for resource inference. This paper also classifies users behavior types based on a user model and then uses them for resource recommendation. The paper implements the proposed method as a prototype system on a personal device with limited resources developed for resource collaboration and shows the effectiveness of the proposed method by evaluating user satisfaction.

Semantic Cloud Resource Recommendation Using Cluster Analysis in Hybrid Cloud Computing Environment (군집분석을 이용한 하이브리드 클라우드 컴퓨팅 환경에서의 시맨틱 클라우드 자원 추천 서비스 기법)

  • Ahn, Younsun;Kim, Yoonhee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.9
    • /
    • pp.283-288
    • /
    • 2015
  • Scientists gain benefits from on-demand scalable resource provisioning, and various computing environments by using cloud computing resources for their applications. However, many cloud computing service providers offer their cloud resources according to their own policies. The descriptions of resource specification are diverse among vendors. Subsequently, it becomes difficult to find suitable cloud resources according to the characteristics of an application. Due to limited understanding of resource availability, scientists tend to choose resources used in previous experiments or over-performed resources without considering the characteristics of their applications. The need for standardized notations on diverse cloud resources without the constraints of complicated specification given by providers leads to active studies on intercloud to support interoperability in hybrid cloud environments. However, projects related to intercloud studies are limited as they are short of expertise in application characteristics. We define an intercloud resource classification and propose semantic resource recommendation based on statistical analysis to provide semantic cloud resource services for an application in hybrid cloud computing environments. The scheme proves benefits on resource availability and cost-efficiency with choosing semantically similar cloud resources using cluster analysis while considering application characteristics.

A Context-Based Device Collaboration System in Ubiquitous Environments (유비쿼터스 환경에서의 상황인지 기반 디바이스 협업 시스템)

  • Park, Won-Ik;Park, Jong-Hyun;Kim, Young-Kuk;Kang, Ji-Hoon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.3
    • /
    • pp.86-96
    • /
    • 2008
  • In ubiquitous environments, invisible devices and software are connected to one another to provide convenient services to users. In order to provide such services, we must have mobile devices that connect users and services. However, the types of available services have thus far been limited due to the limited resources of mobile devices. This paper proposes a solution to the resource limitation problem of mobile devices by presenting a context-based collaboration system that allows mobile devices to share various nearby resources. Our system has a feature to enable personalized resource sharing by dynamically re-configuring user's preference and resource information.

Dynamic Scheduling Method for Cooperative Resource Sharing in Mobile Cloud Computing Environments

  • Kwon, Kyunglag;Park, Hansaem;Jung, Sungwoo;Lee, Jeungmin;Chung, In-Jeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.484-503
    • /
    • 2016
  • Mobile cloud computing has recently become a new paradigm for the utilization of a variety of shared mobile resources via wireless network environments. However, due to the inherent characteristics of mobile devices, a limited battery life, and a network access requirement, it is necessary for mobile servers to provide a dynamic approach for managing mobile resources efficiently in mobile cloud computing environments. Since on-demand job requests occur frequently and the number of mobile devices is drastically increased in mobile cloud computing environments, a different mobile resource management method is required to maximize the computational power. In this paper, we therefore propose a cooperative, mobile resource sharing method that considers both the inherent properties and the number of mobile devices in mobile cloud environments. The proposed method is composed of four main components: mobile resource monitor, job handler, resource handler, and results consolidator. In contrast with conventional mobile cloud computing, each mobile device under the proposed method can be either a service consumer or a service provider in the cloud. Even though each device is resource-poor when a job is processed independently, the computational power is dramatically increased under the proposed method, as the devices cooperate simultaneously for a job. Therefore, the mobile computing power throughput is dynamically increased, while the computation time for a given job is reduced. We conduct case-based experiments to validate the proposed method, whereby the feasibility of the method for the purpose of cooperative computation is shown.

A Hybrid Cloud Testing System Based on Virtual Machines and Networks

  • Chen, Jing;Yan, Honghua;Wang, Chunxiao;Liu, Xuyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1520-1542
    • /
    • 2020
  • Traditional software testing typically uses many physical resources to manually build various test environments, resulting in high resource costs and long test time due to limited resources, especially for small enterprises. Cloud computing can provide sufficient low-cost virtual resources to alleviate these problems through the virtualization of physical resources. However, the provision of various test environments and services for implementing software testing rapidly and conveniently based on cloud computing is challenging. This paper proposes a multilayer cloud testing model based on cloud computing and implements a hybrid cloud testing system based on virtual machines (VMs) and networks. This system realizes the automatic and rapid creation of test environments and the remote use of test tools and test services. We conduct experiments on this system and evaluate its applicability in terms of the VM provision time, VM performance and virtual network performance. The experimental results demonstrate that the performance of the VMs and virtual networks is satisfactory and that this system can improve the test efficiency and reduce test costs through rapid virtual resource provision and convenient test services.

Cognitive Radio Anti-Jamming Scheme for Security Provisioning IoT Communications

  • Kim, Sungwook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4177-4190
    • /
    • 2015
  • Current research on Internet of Things (IoT) has primarily addressed the means to enhancing smart resource allocation, automatic network operation, and secure service provisioning. In particular, providing satisfactory security service in IoT systems is indispensable to its mission critical applications. However, limited resources prevent full security coverage at all times. Therefore, these limited resources must be deployed intelligently by considering differences in priorities of targets that require security coverage. In this study, we have developed a new application of Cognitive Radio (CR) technology for IoT systems and provide an appropriate security solution that will enable IoT to be more affordable and applicable than it is currently. To resolve the security-related resource allocation problem, game theory is a suitable and effective tool. Based on the Blotto game model, we propose a new strategic power allocation scheme to ensure secure CR communications. A simulation shows that our proposed scheme can effectively respond to current system conditions and perform more effectively than other existing schemes in dynamically changeable IoT environments.

Implementation of platform for long-term evolution cell perspective resource utilization analysis

  • Um, Jungsun;Kim, Igor;Park, Seungkeun
    • ETRI Journal
    • /
    • v.43 no.2
    • /
    • pp.232-245
    • /
    • 2021
  • As wireless communication continues to develop in limited frequency resource environments, it is becoming important to identify the state of spectrum utilization and predict the amount needed in future. It is essential to collect reliable information for data analysis. This paper introduces a platform that enables the gathering of the scheduling information of a long-term evolution (LTE) cellular system without connecting to the network. A typical LTE terminal can confirm its assigned resource information using the configuration parameters delivered from a network. However, our platform receives and captures only the LTE signal over the air and then enables the estimation of the data relevant to scheduling for all terminals within an LTE cell. After extracting the control channel signal without loss from all LTE subframes, it detects valid downlink control information using the proposed algorithm, which is based on the error vector magnitude of depatterned symbols. We verify the reliability of the developed platform by comparing it with real data from mobile phones and service operators. The average difference in resource block utilization is only 0.28%.

Adaptive Resource Allocation Schemes in Wireless Mobile Networks (무선 이동 네트워크에서의 적응적 자원 할당 방법)

  • Kang, Yoo-Hwa;Suh, Young-Joo;An, Syung-Og
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.477-488
    • /
    • 2001
  • In wireless networking environments, supporting guaranteed quality of service to mobile hosts is difficult due to the facts that wireless networks have limited bandwidth and mobile hosts frequently move in and out of cells. In spite of the characteristics of wireless communications, the quality of some types of services, i.e., real-time services, must be guaranteed at a certain level. When a mobile host moves into another cell, service rates for mobile hosts in wireless networks may be adjusted since wireless networks have limited bandwidths. In this paper, we propose two resource allocation algorithms in wireless mobile networks, using quality of service (QoS) specifications. For efficient use of resources of wireless networks, the proposed algorithms dynamically allocate rates of flows in proportion to QoS with limited resources.

  • PDF

A PROACTIVE APPROACH FOR RESOURCE CONSTRAINED SCHEDULING OF MULTIPLE PROJECTS

  • Balasubramanian Kanagasabapathi;Kuppusamy Ananthanarayanan
    • International conference on construction engineering and project management
    • /
    • 2005.10a
    • /
    • pp.744-747
    • /
    • 2005
  • The AEC (Architecture/Engineering/Construction) industry is facing a competitive world after it entered into the 21st century. Due to improper planning and scheduling, the construction projects face severe delays in completion. Most of the present day construction organisations operate in multiple project environments where more than one projects are to be managed simultaneously. But the advantages of planning and scheduling as multiple projects have not been utilized by these organisations. Change in multi-project planning and scheduling is inevitable and often frequent, therefore the traditional planning and scheduling approaches are no more feasible in scheduling multiple construction projects. The traditional scheduling tools like CPM and PERT do not offer any help in scheduling in a resource-constrained environment. This necessitated a detailed study to model the environment realistically and to make the allocation of limited resources flexible and efficient. This paper delineates about the proactive model which will help the project managers for scheduling the multiple construction projects.

  • PDF

Performance Analysis of Siding Window based Stream High Utility Pattern Mining Methods (슬라이딩 윈도우 기반의 스트림 하이 유틸리티 패턴 마이닝 기법 성능분석)

  • Ryang, Heungmo;Yun, Unil
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.53-59
    • /
    • 2016
  • Recently, huge stream data have been generated in real time from various applications such as wireless sensor networks, Internet of Things services, and social network services. For this reason, to develop an efficient method have become one of significant issues in order to discover useful information from such data by processing and analyzing them and employing the information for better decision making. Since stream data are generated continuously and rapidly, there is a need to deal with them through the minimum access. In addition, an appropriate method is required to analyze stream data in resource limited environments where fast processing with low power consumption is necessary. To address this issue, the sliding window model has been proposed and researched. Meanwhile, one of data mining techniques for finding meaningful information from huge data, pattern mining extracts such information in pattern forms. Frequency-based traditional pattern mining can process only binary databases and treats items in the databases with the same importance. As a result, frequent pattern mining has a disadvantage that cannot reflect characteristics of real databases although it has played an essential role in the data mining field. From this aspect, high utility pattern mining has suggested for discovering more meaningful information from non-binary databases with the consideration of the characteristics and relative importance of items. General high utility pattern mining methods for static databases, however, are not suitable for handling stream data. To address this issue, sliding window based high utility pattern mining has been proposed for finding significant information from stream data in resource limited environments by considering their characteristics and processing them efficiently. In this paper, we conduct various experiments with datasets for performance evaluation of sliding window based high utility pattern mining algorithms and analyze experimental results, through which we study their characteristics and direction of improvement.