• Title/Summary/Keyword: 자원 최적화

Search Result 825, Processing Time 0.025 seconds

Building the Educational Practice System based on Open Source Cloud Computing (오픈소스 클라우드 컴퓨팅 기반 교육 실습 시스템 구축)

  • Yoon, JunWeon;Park, ChanYeol;Song, Ui-Sung
    • Journal of Digital Contents Society
    • /
    • v.14 no.4
    • /
    • pp.505-511
    • /
    • 2013
  • Recently, cloud computing is being emerged paradigm that a support computing resource flexible and scalable to users as the want in distributed computing environment. Actually, cloud computing can be implemented and provided by virtualization technology. In this paper, we studied open source based cloud computing and built a educational practice system through cloud computing. Virtualization-based cloud computing provides optimized computing resources, as well as easy to manage practical resource and result. Therefore, we can save the time for configuration of practice environment. In the view of faculty, they can easily handle the practice result. Also, those practice condition reuse comfortably and apply to various configuration simply. And then we can increase capabilities and availabilities of limited resources.

A Study on Optimization Problem based on RFID Reader-to-reader Interference Model and Genetic-resource Allocation Technique (RFID 리더간 간섭 모델에 기반 한 최적화 문제와 유전적 자원할당 기법에 관한 연구)

  • Seo, Hyun-Sik;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.4
    • /
    • pp.51-60
    • /
    • 2009
  • In radio frequency identification(RFID) systems, when an RFID reader uses the same or adjacent frequency with neighbor readers, the interference between the readers may occur, which causes the reader collision and errors in tag recognition. In the previous study on RFID reader anti-collision, the techniques based on Frequency Division Mutiplex(FDM) or Time Division Multiplex(TDM) are proposed. However in these paper, the problem on the condition of RFID reader-to-reader interference considering the distance between interfering readers, frequency and operating time is not define exactly. In this paper, the interference effect is analyzed through RFID reader interference model considering the TDM and FDM, and the optimization problem is defined. To solve this, genetic-resource allocation technique is proposed. Therefore the optimal resource allocation applied RFID environment faithfully is accomplished.

Study on ″Policy-based Network service Management System for DEN″ (DEN 서비스를 위한 PBNM 개발)

  • 전준현;백성혁;구태원
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.4
    • /
    • pp.1-10
    • /
    • 2004
  • In NGNs(Next Generation Networks), It is necessary for Integrated management of resource and information to satisfy high-quality users'demands, such as stable speed, guarantee of high level service and service requirement in various fields. In relation to this, technology for efficiently using limited resources is becoming interesting things more and more. Therefore policy of network service is dealt essentially. Recently, DEN(Directory Enabled Network)-based personalization service is user-dependent services in NGNs, and integrated management and efficient use of limited resources. Also, PBNM(Policy-Based Network Management) is new technology defined and applied by policies of communication service environments and users on demand. Subsequently to study on how to optimizing the PBNM is of great importance. In this paper, we propose a technology of the PBNM based on DEN standardized in DMTF(Distributed Management Task Force).

Workspace Generation and Interference Optimization Algorithm by Work-type using 3D Model Object in a Construction Project (건설프로젝트의 작업유형별 3차원 작업공간 생성 및 간섭 최적화 방안)

  • Kim, HyeonSeung;Moon, HyounSeok;Kim, ChangHak;Kang, LeenSeok
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.34 no.6
    • /
    • pp.1911-1918
    • /
    • 2014
  • The increase of input resources, such as labor and equipment, in a construction project causes workspace interference between activities and it influences on the productivity and quality of construction activities. To solve this problem, many studies related to the workspace interference have been performed, however they verified the workspace concerning with only the geometric location of activities or generated the shape of workspace by a whole object concept not separated units of detailed operations. It is difficult for project manager to reasonably analyze the workspace conflict, because the size of workspace cannot reflect the characteristics of an activity and input time of a resource. This paper presents a methodology that can generate three-dimensional models in order to optimize the workspace shape and size by considering with the characteristics of each activity and input time of each resource. The suggested method can be used for the active BIM system that optimizes the workspace conflict without additional construction duration and for the searching algorithm of optimized moving path for construction equipment.

Build the Teaching Practice System based on Cloud Computing for Stabilization through Performance Evaluation (성능분석을 통한 안정화된 클라우드 컴퓨팅 기반 교육 실습 시스템 구축)

  • Yoon, JunWeon;Song, Ui-Sung
    • Journal of Digital Contents Society
    • /
    • v.15 no.5
    • /
    • pp.595-602
    • /
    • 2014
  • Cloud computing is already well known paradigm that a support computing resource flexible and scalable to users as the want in distributed computing environment. Actually, cloud computing can be implemented and provided by virtualization technology. Also, various products are released or under development. In this paper, we built the teaching practice system using cloud computing and evaluated practical environment which constructed over a virtual machine. Virtualization-based cloud computing provides optimized computing resources, as well as easy to manage practical resource and result. Therefore, we can save the time for configuration of practice environment. In the view of faculty, they can easily handle the practice result. Also, those practice condition reuse comfortably and apply to various configuration simply. And then we can increase capabilities and availabilities of limited resources. Additionally, we measure the performance requirements for educational applications through evaluation of virtual-based teaching practical system in advance.

The Dilemma and Its Optimization Paths for Digital Technology to Enable Rural Education-Example: Chengcheng, Zhejiang Province (디지털 기술이 농촌 교육을 가능하게 하는 딜레마와 그 최적화 경로-저장성 원청현을 예로 들어보자)

  • LING YAN;LI JUNWEN;ZHANG HONGFEI;HUANG LINA
    • Journal of the International Relations & Interdisciplinary Education
    • /
    • v.4 no.2
    • /
    • pp.63-76
    • /
    • 2024
  • Digital technology is progressively transforming rural education and offering unprecedented opportunities for advancement. This study aims to analyze the impact of digital technology on rural education, focusing on the usage of digital resources in Wencheng County, Zhejiang Province, as a case study. The primary objective of this research is to explore how the application of digital technology contributes to balanced educational development in rural areas and to identify the key challenges and issues that accompany such technological advancements. The study revealed several significant issues in Wencheng County's rural education system, including inefficient use of digital resources, inadequate digital skills among educators, and insufficient exploration of digital innovation. In particular, the redundant purchasing of digital educational resources and the inefficient utilization of these resources, coupled with the low adaptability of teachers to digital technologies, emerged as major concerns. The study proposes strategies to address these issues. Ultimately, it presents an optimized pathway for successfully implementing digitalization in rural education and offers policy insights that could be applied in other regions to achieve similar improvements.

Design of a Policy-based Security Mechanism for the Secure Grid Applications (안전한 그리드 응용을 위한 정책기반의 보안 기능 설계)

  • Cho, Young-Bok;You, Mi-Kyung;Lee, Sang-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.2
    • /
    • pp.901-908
    • /
    • 2011
  • For the available grid environmental realization, the resource supply PC must have to provide an appropriate security function of their operation environments. SKY@HOME is a kind of the grid computing environments. If this has not supervised by administrator handling smoothly, it is inherently vulnerable state to the security level of the grid environments, because the resource supply PC is not update a security function without delay. It is also have the troublesome problems which have to install of an additional security program for support the appropriate security. This paper proposes an integration security model on the policy-based that provides an update each level according to the situation of the resource supply PC for improving its problems as a security aspect of the SKY@HOME. This model analyzes the security state of the resource supply PC respectively, and then the result is available to provide an appropriate security of the resource supply PC using an integration security model. The proposed model is not need additionally to buy and install the software, because it is provided the security management server oriented service. It is also able to set up the suit security function of a characteristic of the each resource supply PC. As a result, this paper clearly show the participation of resource supply PC improved about 20%.

External Context-Based Selective Resource Utilization Control Technique for Reducing Boot Time of Linux-Based Robot System (리눅스 기반 로봇 시스템의 부트 시간 단축을 위한 외부 컨텍스트 기반 선별적 자원 사용률 조정 기법)

  • Lee, Eunseong;Kim, Jungho;Yang, Beomjoon;Hong, Seongsoo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.147-150
    • /
    • 2017
  • 지능형 로봇의 사용자 품질을 결정하는 주요 요소들 중 하나는 짧은 부트 시간이다. 로봇 시스템에서는 부팅 과정 중에 침입자인지, 자택 순찰, 개인 비서, 엔터테인먼트와 같은 다수의 응용들이 동시에 초기화되는데, 고품질의 사용자 경험을 제공하기 위해서는 사용자 응답성이 중요한 응용들이 우선적으로 초기화되어야한다. 이를 위해 리눅스 기반 로봇 시스템에서 부트 시간을 단축하기 위한 다양한 연구들이 진행되어 왔다. 하지만 이들은 단일 응용 각각에 대한 초기화 시간을 단축하는 연구들이며, 응용들 간에 CPU, 메모리, I/O와 같은 자원 경쟁에 의한 지연 요소를 고려하지 않고 있다. 본 논문에서는 응용들 간의 각종 자원경쟁들을 고려하여 사용자 응답성이 중요한 응용을 우선적으로 초기화하기 위한 외부 컨텍스트 기반 선별적 자원 사용률 조정기법을 제안한다. 이를 리눅스 기반 시스템 상에 구현하여 검증한 결과 응용의 부트 시간이 기존 대비 33.02% 단축됨을 확인했다.

  • PDF

A Low Power-Driven Data Path Optimization based on Minimizing Switching Activity (스위칭 동작 최소화를 통한 저전력 데이터 경로 최적화)

  • 임세진;조준동
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.4
    • /
    • pp.17-29
    • /
    • 1999
  • This paper presents a high level synthesis method targeting low power consumption for data-dominated CMOS circuits (e.g., DSP). The high level synthesis is divided into three basic tasks: scheduling, resource and register allocation. For lower power scheduling, we increase the possibility of reusing an input operand of functional units. For a scheduled data flow graph, a compatibility graph for register and resource allocation is formed, and then a special weighted network is then constructed from the compatibility graph and the minimum cost flow algorithm is performed on the network to obtain the minimum power consumption data path assignment. The formulated problem is then solved optimally in polynomial time. This method reduces both the switching activity and the capacitance in synthesized data path. Experimental results show 15% power reduction in benchmark circuits.

  • PDF

Access Control for Efficient Query Processing on Limited Resource Mobile Terminal (자원제약적인 모바일 단말기에서 효율적인 질의처리를 위한 접근제어)

  • An, Dong-Chan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.8
    • /
    • pp.19-27
    • /
    • 2011
  • Access control that has been previously performed mainly on safety, and thus not much effort has been done to consider access control in terms of efficiency. This paper proposes a method for an efficient and secure query processing of XML data streams, such as a personal digital assistant and a portable terminal, at the client side with limited resources. Specifically, this paper proposes an access control processing that possesses a small overhead for attaining a secure result with limited memory and a method to enhance the performance, finding the parts capable of optimizing each processing step for offsetting the overhead caused by the addition of access control processing. The superiority of the new method is analyzed through an experiments.