• Title/Summary/Keyword: 클라우드-컴퓨팅

Search Result 1,403, Processing Time 0.026 seconds

An Integrated Scientific Workflow Environment over Multiple Infrastructures for Engineering Education of Aerodynamics (다중 인프라 기반의 공력 설계 교육을 위한 과학 워크플로우 통합 환경)

  • Kim, Seoyoung;Kang, Hyejeong;Kim, Yoonhee;Kim, Chongam
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.2
    • /
    • pp.234-240
    • /
    • 2013
  • All around the world, numerous scientists have been carried out researches of e-Science to improve performance of computations and accessibility of their experimental flexibilities for a long times. However, they still have been in difficulty securing high-performance computing facilities. In case of Aerodynamics, for example, a single experiment costs a tremendous amount of budget and requires a span of more than 6 months even though researchers have been developed diverse improved mathematical methods as well as relied on advanced computing technologies to reduce runtime and costs. In this paper, we proposed a multiple infrastructure-based scientific workflow environments for engineering education in fields of design optimization of aircraft and demonstrated the superiority. Since it offers diverse kind of computing resources, it can offer elastic resources regardless of the number of tasks for experiments and limitations of spaces. Also, it can improve education efficiency by using this environment to engineering education.

A Study on the Analysis Techniques for Big Data Computing (빅데이터 컴퓨팅을 위한 분석기법에 관한 연구)

  • Oh, Sun-Jin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.475-480
    • /
    • 2021
  • With the rapid development of mobile, cloud computing technology and social network services, we are in the flood of huge data and realize that these large-scale data contain very precious value and important information. Big data, however, have both latent useful value and critical risks, so, nowadays, a lot of researches and applications for big data has been executed actively in order to extract useful information from big data efficiently and make the most of the potential information effectively. At this moment, the data analysis technique that can extract precious information from big data efficiently is the most important step in big data computing process. In this study, we investigate various data analysis techniques that can extract the most useful information in big data computing process efficiently, compare pros and cons of those techniques, and propose proper data analysis method that can help us to find out the best solution of the big data analysis in the peculiar situation.

A Study on Integrity Protection of Edge Computing Application Based on Container Technology (컨테이너 기술을 활용한 엣지 컴퓨팅 환경 어플리케이션 무결성 보호에 대한 연구)

  • Lee, Changhoon;Shin, Youngjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1205-1214
    • /
    • 2021
  • Edge Computing is used as a solution to the cost problem and transmission delay problem caused by network bandwidth consumption that occurs when IoT/CPS devices are integrated into the cloud by performing artificial intelligence (AI) in an environment close to the data source. Since edge computing runs on devices that provide high-performance computation and network connectivity located in the real world, it is necessary to consider application integrity so that it is not exploited by cyber terrorism that can cause human and material damage. In this paper, we propose a technique to protect the integrity of edge computing applications implemented in a script language that is vulnerable to tampering, such as Python, which is used for implementing artificial intelligence, as container images and then digitally signed. The proposed method is based on the integrity protection technology (Docker Contents Trust) provided by the open source container technology. The Docker Client was modified and used to utilize the whitelist for container signature information so that only containers allowed on edge computing devices can be operated.

Performance Comparison and Optimal Selection of Computing Techniques for Corridor Surveillance (회랑감시를 위한 컴퓨팅 기법의 성능 비교와 최적 선택 연구)

  • Gyeong-rae Jo;Seok-min Hong;Won-hyuck Choi
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.6
    • /
    • pp.770-775
    • /
    • 2023
  • Recently, as the amount of digital data increases exponentially, the importance of data processing systems is being emphasized. In this situation, the selection and construction of data processing systems are becoming more important. In this study, the performance of cloud computing (CC), edge computing (EC), and UAV-based intelligent edge computing (UEC) was compared as a way to solve this problem. The characteristics, strengths, and weaknesses of each method were analyzed. In particular, this study focused on real-time large-capacity data processing situations such as corridor monitoring. When conducting the experiment, a specific scenario was assumed and a penalty was given to the infrastructure. In this way, it was possible to evaluate performance in real situations more accurately. In addition, the effectiveness and limitations of each computing method were more clearly understood, and through this, the help was provided to enable more effective system selection.

Analysis on Trend of Study Related to Computational Thinking Using Topic Modeling (토픽 모델링을 이용한 컴퓨팅 사고력 관련 연구 동향 분석)

  • Moon, Seong-Yun;Song, Ki-Sang
    • Journal of The Korean Association of Information Education
    • /
    • v.23 no.6
    • /
    • pp.607-619
    • /
    • 2019
  • As software education was introduced through the 2015 revised curriculum, various research activities have been carried out to improve the computational thinking of learners beyond the existing ICT literacy and software utilization education. With this change, the purpose of this study is to examine the research trends of various research activities related to computational thinking which is emphasized in software education. To this end, we extracted the key words from 190 papers related to computational thinking subject published from January 2014 to September 2019, and conducted frequency analysis, word cloud, connection centrality, and topic modeling analysis on the words. As a result of the topical modeling analysis, we found that the main studies so far have included studies on 'computational thinking education program', 'computational thinking education for pre-service teacher education', 'robot utilization education for computational thinking', 'assessment of computational thinking', and 'computational thinking connected education'. Through this research method, it was possible to grasp the research trend related to computational thinking that has been conducted mainly up to now, and it is possible to know which part of computational thinking education is more important to researchers.

Modeling of Virtual Switch in Cloud System (클라우드 시스템의 가상 스위치 모델링)

  • Ro, Cheul-Woo
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.479-485
    • /
    • 2013
  • Virtualization is a promising approach to consolidating multiple online services onto a smaller number of computing resources. A virtualized server environment allows computing resources to be shared among multiple performance isolated platforms called virtual machines. Through server virtualization software, applications servers are encapsulated into VMs, and deployed with APIs on top generalized pools of CPU and memory resources. Networking and security have been moved to a software abstraction layer that transformed computing, network virtualization. And it paves the way for enterprise to rapidly deploy networking and security for any application by creating the virtual network. Stochastic reward net (SRN) is an extension of stochastic Petri nets which provides compact modeling facilities for system analysis. In this paper, we develop SRN model of network virtualization based on virtual switch. Measures of interest such as switching delay and throughput are considered. These measures are expressed in terms of the expected values of reward rate functions for SRNs. Numerical results are obtained according to the virtual switch capacity and number of active VMs.

A Study on Web-based operating system (웹 기반 운영체제에 관한 연구)

  • Bae, Yu-Mi;Jung, Sung-Jae;Jang, Rae-Young;Park, Jeong-Su;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.674-677
    • /
    • 2012
  • An operating system acts as an intermediary between your computer hardware and computer users to perform, that the user can run the program provides an environment in which. Therefore, the main purpose of the operating system having a computer available for your convenience and to effectively manage computer hardware. The popularization of the people who use computers, improve hardware performance, advent of the internet, popularity of wireless networks, Smartphone and Tablet PC appearance, advent of virtualization technologies and cloud computing, etc. began making changes to the operating system. In particular, cloud computing environments based on server virtualization and using a variety of wired and wireless devices with internet connection, a Web-based operating system was born. In this paper, the definition of a Web-based operating system, types and characteristics, an analysis of the pros and cons, and find out about the future prospects.

  • PDF

Fuzzy Logic-based Context-Aware Access Control Model for the Cloud Computing Environment (클라우드 컴퓨팅 환경을 위한 퍼지 논리 기반 상황인식 접근 제어 모델)

  • Jing, Si Da;Chung, Mok-Dong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.4
    • /
    • pp.51-60
    • /
    • 2011
  • Authentication model in the wireless environment has many security vulnerabilities. However, there is no adapting standard method in this field. Therefore, we propose a fuzzy logic based authentication model to enhance the security level in the authentication environment. We use fuzzy logic based classification to construct our model, and also additionally utilize improved AHP and case-based reasoning for an appropriate decision making. We compute the context information by using the improved AHP method, use the proposed model to compute the security level for the input data, and securely apply the proposed model to the wireless environment which has diverse context information. We look forward to better security model including cloud computing by extending the proposed method in the future.

Idea proposal of InfograaS for Visualization of Public Big-data (공공 빅데이터의 시각화를 위한 InfograaS의 아이디어 제안)

  • Cha, Byung-Rae;Lee, Hyung-Ho;Sim, Su-Jeong;Kim, Jong-Won
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.5
    • /
    • pp.524-531
    • /
    • 2014
  • In this paper, we have proposed the processing and analyzing the linked open data (LOD), a kind of big-data, using resources of cloud computing. The LOD is web-based open data in order to share and recycle of public data. Specially, we defined the InfograaS (Info-graphic as a service), new business area of SaaS (software as a service), to support visualization technique for BA (business analytics) and Info-graphic. The goal of this study is easily to use it by the non-specialist and beginner without experts of visualization and business analysis. Data visualization is the process to represent visually and understand the data analysis easily. The purpose of data visualization is to deliver information clearly and effectively by chart and figure. The big data of public data are shared and presented in the charts and the graphics understood easily by various processing results using Hadoop, R, machine learning, and data mining of open source and resources of cloud computing.

QEMU/KVM Based In-Memory Block Cache Module for Virtualization Environment (가상화 환경을 위한 QEMU/KVM 기반의 인메모리 블록 캐시 모듈 구현)

  • Kim, TaeHoon;Song, KwangHyeok;No, JaeChun;Park, SungSoon
    • Journal of KIISE
    • /
    • v.44 no.10
    • /
    • pp.1005-1018
    • /
    • 2017
  • Recently, virtualization has become an essential component of cloud computing due to its various strengths, including maximizing server resource utilization, easy-to-maintain software, and enhanced data protection. However, since virtualization allows sharing physical resources among the VMs, the system performance can be deteriorated due to device contentions. In this paper, we first investigate the I/O overhead based on the number of VMs on the same server platform and analyze the block I/O process of the KVM hypervisor. We also propose an in-memory block cache mechanism, called QBic, to overcome I/O virtualization latency. QBic is capable of monitoring the block I/O process of the hypervisor and stores the data with a high access frequency in the cache. As a result, QBic provides a fast response for VMs and reduces the I/O contention to physical devices. Finally, we present a performance measurement of QBic to verify its effectiveness.