• Title/Summary/Keyword: user task

Search Result 811, Processing Time 0.031 seconds

A Multi-Class Task Scheduling Strategy for Heterogeneous Distributed Computing Systems

  • El-Zoghdy, S.F.;Ghoneim, Ahmed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.117-135
    • /
    • 2016
  • Performance enhancement is one of the most important issues in high performance distributed computing systems. In such computing systems, online users submit their jobs anytime and anywhere to a set of dynamic resources. Jobs arrival and processes execution times are stochastic. The performance of a distributed computing system can be improved by using an effective load balancing strategy to redistribute the user tasks among computing resources for efficient utilization. This paper presents a multi-class load balancing strategy that balances different classes of user tasks on multiple heterogeneous computing nodes to minimize the per-class mean response time. For a wide range of system parameters, the performance of the proposed multi-class load balancing strategy is compared with that of the random distribution load balancing, and uniform distribution load balancing strategies using simulation. The results show that, the proposed strategy outperforms the other two studied strategies in terms of average task response time, and average computing nodes utilization.

A Study on UI Design Guideline based for UCC(User Created Content) Service for Video - Focused on Viewing Interface and Uploading Interface - (UCC(User Created Content) 동영상 서비스를 위한 UI Design 가이드라인 개발에 관한 연구 - Viewing Interface 및 Uploading Interface를 중심으로 -)

  • Kim, Hee-Jeong;Kim, Hyun-Jeong
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02b
    • /
    • pp.112-117
    • /
    • 2007
  • Web 2.0 시대의 도래와 함께 사용자가 제작한 동영상 컨텐츠를 공유하는 웹서비스인 UCC에 대한 관심이 날로 높아지고 있다. 이는 지속적인 사용이 요구되는 서비스 분야로서 UI의 중요성이 더욱 절실한 분야이다. 이에 본 연구에서는 UCC 동영상 서비스 사이트의 UI Design 가이드라인을 제시하기 위하여 다음과 같은 연구를 진행하였다. 다양한 UCC 동영상 서비스의 대표사이트 중 국외의 YouTube 사이트와 국내의 Pandora 사이트를 중심으로 Task 분석을 통해 사용성 평가에 필요한 Task 항목을 도출하였다. 사용성 평가를 실시한 후, 평가 결과를 분석하여 문제점을 종합하고 실제 다른 사이트의 UI Design을 분석하는데 필요한 비교 분석표를 제안하였다. 이 비교 분석표를 통해 대표적인 UCC 동영상 서비스 사이트의 사례 분석을 실시한 후, 최종 UCC 동영상 서비스를 위한 UI Design 가이드라인을 제안한다.

  • PDF

Scan-to-Geometry Mapping Rule Definition for Building Plane Reverse engineering Automation (건축물 평면 형상 역설계 자동화를 위한 Scan-to-Geometry 맵핑 규칙 정의)

  • Kang, Tae-Wook
    • Journal of KIBIM
    • /
    • v.9 no.2
    • /
    • pp.21-28
    • /
    • 2019
  • Recently, many scan projects are gradually increasing for maintenance, construction. The scan data contains useful data, which can be generated in the target application from the facility, space. However, modeling the scan data required for the application requires a lot of cost. In example, the converting 3D point cloud obtained from scan data into 3D object is a time-consuming task, and the modeling task is still very manual. This research proposes Scan-to-Geometry Mapping Rule Definition (S2G-MD) which maps point cloud data to geometry for irregular building plane objects. The S2G-MD considers user use case variability. The method to define rules for mapping scan to geometry is proposed. This research supports the reverse engineering semi-automatic process for the building planar geometry from the user perspective.

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering the Age of User Profiles

  • Bae, Ihn-Han
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1726-1732
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal attackers - masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on this, the used pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with the age of the user profile. The performance of the proposed scheme is evaluated by using a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed scheme that considers the age of user profiles.

  • PDF

Development of a Distributed OperatorTtraining System (조업자 훈련을 위한 분산 교육시스템 구축)

  • Cho, Sung-Il;Jang, Byung-Mu;Moon, Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.1424-1427
    • /
    • 1996
  • OTS(Operator Training System) requires computation for the systematic training in real-time. So we have developed a distributed operator training system that is composed of workstation based server and PC based user modules. Sever and OM(OTS Manager) modules are located in the workstation server and user modules are located in PCs. User modules have DCS-like user interfaces and transfer data with OM over the coaxial ethernet. This paper delineates a total system architecture and definition of data transferring between OM and User module. Having applied this system to a batch process, we could analyze operator's tasks.

  • PDF

Design and Evaluation of a Dynamic Anomaly Detection Scheme Considering the Age of User Profiles

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.18 no.2
    • /
    • pp.315-326
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents a dynamic anomaly detection scheme that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with both the age of the user profile and weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed dynamic scheme that considers the age of user profiles.

  • PDF

A Study on the Construction of an Efficient Text-Based User Interface (효율적 문자 기반의 사용자 인터폐이스 구축에 관한 연구)

  • 허진석;서장춘
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.289-289
    • /
    • 2000
  • In this paper, a new text-based method is suggested for the user-system interaction. The use of text-based user interface is mote efficient under situation which don't be introduced the GUI because of the limitation of hardware cost or improvement of system performance. The dialogical method using suggested hierarchical structure is the easier for a convenience of usage and the method in this paper is the more useful as considering knowledgeable background and environment of task for user As a practical example, the method for the proposed text-based user interface construction is applied to Double-Lift Open Shedding Electronic Jacquard.

  • PDF

A Security Assessment on the Designated PC service

  • Lee, Kyungroul;Yim, Kangbin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.12
    • /
    • pp.61-66
    • /
    • 2015
  • In this paper, we draw a security assessment by analyzing possible vulnerabilities of the designated PC service which is supposed for strengthening security of current online identification methods that provide various areas such as the online banking and a game and so on. There is a difference between the designated PC service and online identification methods. Online identification methods authenticate an user by the user's private information or the user's knowledge-based information, though the designated PC service authenticates a hardware-based unique information of the user's PC. For this reason, high task significance services employ with online identification methods and the designated PC service for improving security multiply. Nevertheless, the security assessment of the designated PC service has been absent and possible vulnerabilities of the designated PC service are counterfeiter and falsification when the hardware-based unique-information is extracted on the user's PC and sent an authentication server. Therefore, in this paper, we analyze possible vulnerabilities of the designated PC service and draw the security assessment.

A Genetic Algorithm Based Task Scheduling for Cloud Computing with Fuzzy logic

  • Singh, Avtar;Dutta, Kamlesh
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.6
    • /
    • pp.367-372
    • /
    • 2013
  • Cloud computing technology has been developing at an increasing expansion rate. Today most of firms are using this technology, making improving the quality of service one of the most important issues. To achieve this, the system must operate efficiently with less idle time and without deteriorating the customer satisfaction. This paper focuses on enhancing the efficiency of a conventional Genetic Algorithm (GA) for task scheduling in cloud computing using Fuzzy Logic (FL). This study collected a group of task schedules and assessed the quality of each task schedule with the user expectation. The work iterates the best scheduling order genetic operations to make the optimal task schedule. General GA takes considerable time to find the correct scheduling order when all the fitness function parameters are the same. GA is an intuitive approach for solving problems because it covers all possible aspects of the problem. When this approach is combined with fuzzy logic (FL), it behaves like a human brain as a problem solver from an existing database (Memory). The present scheme compares GA with and without FL. Using FL, the proposed system at a 100, 400 and 1000 sample size*5 gave 70%, 57% and 47% better improvement in the task time compared to GA.

  • PDF

Ontology-based Safety Risk Interactions Analysis for Supporting Pre-task Planning

  • Tran, Si Van-Tien;Lee, Doyeop;Pham, Trang Kieu;Khan, Numan;Park, Chansik
    • International conference on construction engineering and project management
    • /
    • 2020.12a
    • /
    • pp.96-102
    • /
    • 2020
  • The construction industry remains serious accidents, injuries, and fatalities due to it's unique, dynamic, and temporary nature. On workplace sites, Safety pre-task planning is one of the efforts to minimize injuries and help construction personnel to identify potential hazards. However, the working conditions are complicated. Many activities, including tasks or job steps, are executing at the same time and place. It may lead to an increase in the risks from simultaneous tasks. This paper contributes to addressing this issue by introducing a safety risk interaction analyzing framework. To accomplish this objective, accident reports of the Occupational Safety and Health Administration (OSHA) are investigated. The pairs of task incompatibility, which have time-space conflicts and lead to incidents, are found. Ontology technology is applied to build the risk database, in which the information is acquired, structuralized. The proposed system is expected to improve pre-task planning efficiency and relieve the burdens encountered by safety managers. A user scenario is also discussed to demonstrate how the ontology supports pre-task planning in practice.

  • PDF