• Title/Summary/Keyword: Cloud computing services

Search Result 638, Processing Time 0.025 seconds

Design and Implementation of HPC Job Management Framework for Computational Scientific Simulation (계산과학 시뮬레이션을 위한 HPC 작업 관리 프레임워크의 설계 및 구현)

  • Yu, Jung-Lok;Kim, Han-Gi;Byun, Hee-Jung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.554-557
    • /
    • 2016
  • Recently, supercomputer has been increasingly adopted as a computing environment for scientific simulation as well as education, healthcare and national defence. Especially, supercomputing system with heterogeneous computing resources is gaining resurgence of interest as a next-generation problem solving environment, allowing theoretical and/or experimental research in various fields to be free of time and spatial limits. However, traditional supercomputing services have only been handled through a simple form of command-line based console, which leads to the critical limit of accessibility and usability of heterogeneous computing resources. To address this problem, in this paper, we provide the design and implementation of web-based HPC (High Performance Computing) job management framework for computational scientific simulation. The proposed framework has highly extensible design principles, providing the abstraction interfaces of job scheduler (as well as bundle scheduler plug-ins for LoadLeveler, Sun Grid Engine, OpenPBS scheduler) in order to easily incorporate the broad spectrum of heterogeneous computing resources such as cluster, computing cloud and grid. We also present the detailed specification of HTTP standard based RESTful endpoints, which manage simulation job's life-cycles such as job creation, submission, control and status monitoring, etc., enabling various 3rd-party applications to be newly created on top of the proposed framework.

  • PDF

Design and Implementation of the Graphical Relational Searching for Folksonomy Tags in the Participational Architecture of Web 2.0 (웹2.0의 참여형 아키텍쳐 환경에서 그래픽 기반 포크소노미 태그 연관 검색의 설계 및 구현)

  • Kim, Woon-Yong;Park, Seok-Gyu
    • Journal of Internet Computing and Services
    • /
    • v.8 no.5
    • /
    • pp.1-10
    • /
    • 2007
  • Recently, the web 2.0 services which appear by exponential extension of the Internet can be expressed with the changes in the quality of structural evolution and in the quantity of increasing users. The structural base is in user participational architecture, the web 2.0 services such as Blog, UCC, SNS(Social Networking Service), Mash-up, Long tail, etc. play a important role in organization of web, and grouping and searching of user participational data in web 2.0 is broadly used by folksonomy. Folksonomy is a new form that categorizes by tags, not classic taxonomy skill. it is made by user participation. Searching based on tag is now done by a simple text or a tag cloud method. But searching to consider and express the relations among each tags is imperfect yet. Thus, this paper provides the relational searching based on tags using the relational graph of tags. It should improve the trust of the searching and provide the convenience of the searching.

  • PDF

Policy Design to Vitalize Spectrum Sharing Ecosystem : A System Dynamics Approach (인과지도에 기반한 주파수공유 생태계 활성화 정책 설계)

  • Song, Hee Seok;Kim, Jae Kyung;Kim, Taehan
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.109-122
    • /
    • 2014
  • Demand of spectrum resource is tremendously increasing recently and this trend will continues in the future due to the wide spread of IT services based on cloud computing and Internet of Things technology and as well as smart devices. Recently, spectrum sharing technology has drawn attention to the spectrum policy makers as a promising way to overcome the shortage problem of scarce spectrum resource. To succeed in commercialization of spectrum sharing technology, it is necessary to prospect the future business ecosystem of spectrum sharing and develop appropriate policies and laws at the same time along with the advance of spectrum sharing technology. The purpose of this paper is to analyze casual relationships between enablers in future business ecosystem of spectrum sharing and propose policies to vitalize spectrum sharing ecosystem based on a system dynamics causal map proposed in the previous research. With the causal map and system dynamics method, it is possible to analyze feedback loops exist in the business ecosystem of spectrum sharing and build policies which optimize positive dynamics in business ecosystem of spectrum sharing. As a result, policy leverages were found in four areas; spectrum supply, spectrum demand, spectrum quality and technology, and spectrum transaction cost. For those policy leverages, 13 policies were identified and intervention timing for each policy was discussed. Finally, the promotion policies of government and market participants to vitalize spectrum sharing ecosystem were discussed.

Strategic Framework for $Web^2$ Mobile Marketing

  • Lee, Bong-Gyou;Seo, Hyun-Sik;Kim, Yong-Beom;Park, Soo-Kyung;Kim, Taisiya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2087-2102
    • /
    • 2011
  • The purpose of this study is to develop and present a strategic framework for mobile Internet marketing in the $Web^2$ environment. The $Web^2$ mobile Internet marketing is characterized by services, such as augmented reality and social network services. Considering the changes in the effects and types of advertisements in the mobile Internet, few studies of mobile advertisements have been conducted thus far in the $Web^2$ environment, including the cloud computing environment. Accordingly, this research aims to identify the relationships between importance and satisfaction and to uncover the characteristics of mobile advertisements through smart phones using the IPA (Importance-performance Analysis) methodology in the $Web^2$ environment. To induce the minimum required characteristics of a mobile advertisement in terms of the importance and satisfaction of IPA, Kano's model is applied to this analysis. The study also probes the relationships between the overall satisfaction and factors of each dimension of IPA through a regression analysis. As a result, this study presents four types of $Web^2$ mobile Internet marketing strategies. It was also confirmed that the maintenance reinforcement factors of the IPA dimension affect the degree of overall satisfaction. This study has implications for businesses and researchers preparing $Web^2$ mobile services and marketing.

CCN-Helper Performance Analysis for Data Transmission Delay over Federated Testbed Environment (국제 연동 테스트베드에서 데이터 전송 지연을 위한 CCN-Helper 성능 분석)

  • Choi, Won-jun;Ramneek, Ramneek;Seok, Woo-jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1947-1957
    • /
    • 2015
  • CCN networking is one of the future internet. With the rapid development of network platforms emerged a wide range of services through a virtual network environment. The performance of CCN in the high bandwidth delay is important to provide various services between nations. We can check the high bandwidth delay product in federation. Federation between the nations has the advantage of being effective to do a various services for the users, and the remote heterogeneous physical hardware engine supports various environments. Data transmission delay can be occur in long distance network even though the network is federated network. In this paper, we propose CCN-Helper protocol for data transmission delay in ling distance networks. We connect from KREONET in Korea to iLab.t in Belgique in order to test CCNx over heterogeneous federated environment.

A Study on the Evaluation Differences of Korean and Chinese Users in Smart Home App Services through Text Mining based on the Two-Factor Theory: Focus on Trustness (이요인 이론 기반 텍스트 마이닝을 통한 한·중 스마트홈 앱 서비스 사용자 평가 차이에 대한 연구: 신뢰성 중심)

  • Yuning Zhao;Gyoo Gun Lim
    • Journal of Information Technology Services
    • /
    • v.22 no.3
    • /
    • pp.141-165
    • /
    • 2023
  • With the advent of the fourth industrial revolution, technologies such as the Internet of Things, artificial intelligence and cloud computing are developing rapidly, and smart homes enabled by these technologies are rapidly gaining popularity. To gain a competitive advantage in the global market, companies must understand the differences in consumer needs in different countries and cultures and develop corresponding business strategies. Therefore, this study conducts a comparative analysis of consumer reviews of smart homes in South Korea and China. This study collected online reviews of SmartThings, ThinQ, Msmarthom, and MiHome, the four most commonly used smart home apps in Korea and China. The collected review data is divided into satisfied reviews and dissatisfied reviews according to the ratings, and topics are extracted for each review dataset using LDA topic modeling. Next, the extracted topics are classified according to five evaluation factors of Perceived Usefulness, Reachability, Interoperability,Trustness, and Product Brand proposed by previous studies. Then, by comparing the importance of each evaluation factor in the two datasets of satisfaction and dissatisfaction, we find out the factors that affect consumer satisfaction and dissatisfaction, and compare the differences between users in Korea and China. We found Trustness and Reachability are very important factors. Finally, through language network analysis, the relationship between dissatisfied factors is analyzed from a more microscopic level, and improvement plans are proposed to the companies according to the analysis results.

Multi-Obfuscation Approach for Preserving Privacy in Smart Transportation

  • Sami S. Albouq;Adnan Ani Sen;Nabile Almoshfi;Mohammad Bin Sedeq;Nour Bahbouth
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.139-145
    • /
    • 2023
  • These days, protecting location privacy has become essential and really challenging, especially protecting it from smart applications and services that rely on Location-Based Services (LBS). As the technology and the services that are based on it are developed, the capability and the experience of the attackers are increased. Therefore, the traditional protection ways cannot be enough and are unable to fully ensure and preserve privacy. Previously, a hybrid approach to privacy has been introduced. It used an obfuscation technique, called Double-Obfuscation Approach (DOA), to improve the privacy level. However, this approach has some weaknesses. The most important ones are the fog nodes that have been overloaded due to the number of communications. It is also unable to prevent the Tracking and Identification attacks in the Mix-Zone technique. For these reasons, this paper introduces a developed and enhanced approach, called Multi-Obfuscation Approach (MOA that mainly depends on the communication between neighboring fog nodes to overcome the drawbacks of the previous approach. As a result, this will increase the resistance to new kinds of attacks and enhance processing. Meanwhile, this approach will increase the level of the users' privacy and their locations protection. To do so, a big enough memory is needed on the users' sides, which already is available these days on their devices. The simulation and the comparison prove that the new approach (MOA) exceeds the DOA in many Standards for privacy protection approaches.

An Analysis on effectiveness of Problem-Based Learning in Web 2.0 Environment (웹 2.0 기반의 문제중심학습의 효과)

  • Kim, Hongrae
    • Journal of The Korean Association of Information Education
    • /
    • v.16 no.4
    • /
    • pp.439-450
    • /
    • 2012
  • This paper explores effectiveness of integrating Problem-Based Learning with Web 2.0 technologies in Computer subject matter education for improving quality of lessons and adapting of social needs for pre-service teachers. Students have studied about computer subject matter for 4 times. The process of leaning have recorded by Web 2.0 tools that is one of the cloud services. Also the students have written reflection journals about experiences of PBL process and results. The PBL process and reflection journals have been analyzed by qualitative data analysis. Conclusions are drawn as to potential for the use of Web 2.0 tools for PBL in computer subject matter. The results of the analyses showed the following: 1) Increasing the understanding of the computer subject matter education, 2) enhancing students' competence in using ICT potentially, 3) cultivating teaching and learning strategies on Web 2.0 environment and 4) enhancing competence of future teaching activities through experiencing e-portfolio as a performance-assessment tool.

  • PDF

An Efficient Log Data Management Architecture for Big Data Processing in Cloud Computing Environments (클라우드 환경에서의 효율적인 빅 데이터 처리를 위한 로그 데이터 수집 아키텍처)

  • Kim, Julie;Bahn, Hyokyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.1-7
    • /
    • 2013
  • Big data management is becoming increasingly important in both industry and academia of information science community. One of the important categories of big data generated from software systems is log data. Log data is generally used for better services in various service providers and can also be used as information for qualification. This paper presents a big data management architecture specialized for log data. Specifically, it provides the aggregation of log messages sent from multiple clients and provides intelligent functionalities such as analyzing log data. The proposed architecture supports an asynchronous process in client-server architectures to prevent the potential bottleneck of accessing data. Accordingly, it does not affect the client performance although using remote data store. We implement the proposed architecture and show that it works well for processing big log data. All components are implemented based on open source software and the developed prototypes are now publicly available.

ADAM: An Approach of Digital Asset Management system (사후 디지털 자산 관리 시스템에 관한 연구)

  • Moon, Jeong-Kyung;Kim, Hwang-Rae;Kim, Jin-Mook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1977-1982
    • /
    • 2012
  • Social network service user or smart phone user is very convenient, because there are supported to various social network services such as Facebook, Twitter, Flickr, Naver blog, Daum blog, and so on. This Is very good because they store multimedia datas that user wants to cyber space if they want it conveniently. But, if social network user increases, space of cloud storage increases sharply, and when social network service used user dies then they have big problems such as they did not know in existing. Typically, problems of notice, dissemination, storage, and inheritance for digital asset can happen representatively. Now, If successor send relation information of he and his dead user that is family to social network service provider then service provider checks it. And successor may can use, save and only backup are possible after confirm of family relation truth. Therefore, We wish to propose ADAM that successor may can inherit digital assets easily, conveniently, and safely in this paper. If someone use ADAM, successor submits information about dead and own family relation in the third certification party. And ADAM can be inherited freely and conveniently about digital assets as general assets passing through right inheritance process.