• Title/Summary/Keyword: Computing Costs

Search Result 274, Processing Time 0.027 seconds

Cloud System Construction for Availability of University Information System

  • Jang, Hae-Sook;Park, Ki-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.12
    • /
    • pp.179-186
    • /
    • 2017
  • Managing students' data is a high prioritized duty of the university administration since most of the school affairs are proceed based on that database. Universities have invested in IT assets such as servers, storage, database, and networks. However, continuing investment in IT infrastructure is impossible due to limited budget and rapid changes in the educational environment. As cloud computing diffuse, universities are trying to reduce costs and improve efficiency by increasing server utilization, unlike when physically investing. We designed a hypothetical academic information management system based on cloud computing by utilizing the advanced server virtualization technology. This administrative cloud system allows universities to improve the availability of the system with low cost. The system demonstrates its flexibility of using data resources and immediacy of resumption.

Viewer's Affective Feedback for Video Summarization

  • Dammak, Majdi;Wali, Ali;Alimi, Adel M.
    • Journal of Information Processing Systems
    • /
    • v.11 no.1
    • /
    • pp.76-94
    • /
    • 2015
  • For different reasons, many viewers like to watch a summary of films without having to waste their time. Traditionally, video film was analyzed manually to provide a summary of it, but this costs an important amount of work time. Therefore, it has become urgent to propose a tool for the automatic video summarization job. The automatic video summarization aims at extracting all of the important moments in which viewers might be interested. All summarization criteria can differ from one video to another. This paper presents how the emotional dimensions issued from real viewers can be used as an important input for computing which part is the most interesting in the total time of a film. Our results, which are based on lab experiments that were carried out, are significant and promising.

Client Rendering Method for Desktop Virtualization Services

  • Jang, Su Min;Choi, Won Hyuk;Kim, Won Young
    • ETRI Journal
    • /
    • v.35 no.2
    • /
    • pp.348-351
    • /
    • 2013
  • Cloud computing has recently become a significant technology trend in the IT field. Among the related technologies, desktop virtualization has been applied to various commercial applications since it provides many advantages, such as lower maintenance and operation costs and higher utilization. However, the existing solutions offer a very limited performance for 3D graphics applications. Therefore, we propose a novel method in which rendering commands are not executed at the host server but rather are delivered to the client through the network and are executed by the client's graphics device. This method prominently reduces server overhead and makes it possible to provide a stable service at low cost. The results of various experiments prove that the proposed method outperforms all existing solutions.

RFID-Based RTLS for Improvement of Loading Productivity in Container Terminals

  • Park, Doo-Jin;Nam, Ki-Chan
    • Journal of Navigation and Port Research
    • /
    • v.30 no.4
    • /
    • pp.285-290
    • /
    • 2006
  • Shipping companies consider most of the ship turnaround time as a critical factor when selecting a rolling port for reducing costs. So, many researchers have been studying for the optimization of preplanning and high~performance of the Gantry Cranes (GCs) in container terminals for faster loading and unloading. Therefore, in this paper, we propose an RFID (Radio Frequency Identification) based RTLS (Real-Time Location System) for reducing the ship turnaround time in ubiquitous port environment. In addition, pre-planning based on ubiquitous computing environment will support the GC and Yard Tractors (YTs), and reduce ship turnaround time more effectively. Especially, the proposed method enormously enhances the productivity of loading for the twin-lift system It will reduce the whole lead-time in the process of port logistics.

A Study on the Validity of Government Cloud SaaS Service Migration using TCO Approach (TCO 접근방법을 통한 정부클라우드 SaaS 서비스 전환의 타당성에 관한 연구)

  • Yoon, Seong-Jeong;Kim, In-Hwan;Seo, Jung Wook;Kim, Min-Yong
    • Journal of Information Technology Services
    • /
    • v.11 no.4
    • /
    • pp.215-231
    • /
    • 2012
  • It is well known that SaaS(Software as a Service) changeover gives several advantages to organization. One of the advantages is the cost reduction effect of IT resources as well as IT human resources. Another one is the curtailment of software development workload in the field of informatization promotions. Nonetheless, it is hard to find comparison cases regarding the quantitative measurement of the introduction of SaaS before and after. Accordingly, when the Government IDC tries to adopt SaaS, it absolutely needs the empirical study whether SaaS is cost-effectiveness or not. In this study, we focus on variation in the Government administration common tasks, processes and labor costs. Using the Man-Month(MM) estimation methods, We verify that how much TCO(Total Cost of Ownership) is reduced per year.

DRL based Dynamic Service Mobility for Marginal Downtime in Multi-access Edge Computing

  • Mwasinga, Lusungu Josh;Raza, Syed Muhammad;Chu, Hyeon-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.114-116
    • /
    • 2022
  • The advent of the Multi-access Edge Computing (MEC) paradigm allows mobile users to offload resource-intensive and delay-stringent services to nearby servers, thereby significantly enhancing the quality of experience. Due to erratic roaming of mobile users in the network environment, maintaining maximum quality of experience becomes challenging as they move farther away from the serving edge server, particularly due to the increased latency resulting from the extended distance. The services could be migrated, under policies obtained using Deep Reinforcement Learning (DRL) techniques, to an optimal edge server, however, this operation incurs significant costs in terms of service downtime, thereby adversely affecting service quality of experience. Thus, this study addresses the service mobility problem of deciding whether to migrate and where to migrate the service instance for maximized migration benefits and marginal service downtime.

Sensitivity Analysis of Quasi-Governmental Agencies' Decisions for Cloud Computing Service (준 정부기관 클라우드 컴퓨팅 서비스 결정에 대한 민감도 분석)

  • Song, In Kuk
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.91-100
    • /
    • 2015
  • Recently many companies began to feel the pressures of cost savings due to the global recession, so they have been interested in the Cloud Computing. Cloud Computing is one of using method of IT resources through the network. Users can borrow softwares or hardwares instead of buying them. Many people expect remarkable growth in Cloud Computing industry because of it's effectiveness. But Cloud Computing industry is still at an early stage. Especially, people who in the public sector hesitate to adopt Cloud Computing Services due to security issues and their conservative views. Also, they just have limited understanding, so we need to investigate what they really know and understand. Researches about the Cloud Computing generally focus on technical issues, so we can hardly find researches reference for decision making in considering the services. The study aims to investigate diverse factors for agencies' adoption decisions, such as benefits, costs, and risk in developing the most ideal type of cloud computing service for them, and performs priority analyses by applying ANP (Analytic Network Process). The results identify that features pertaining to the risk properties were considered the most significant factors. According to this research, the usage of private cloud computing services may prove to be appropriate for public environment in Korea. The study will hopefully provide the guideline to many governmental agencies and service providers, and assist the related authorities with cloud computing policy in coming up with the relevant regulations.

A Study on the Direction of Ubiquitous Office with a Focus on Work Services (업무유형에 따른 유비쿼터스 오피스 계획 방향에 관한 연구)

  • Cho, Myung Eun;Chae, Hee Hwa;Lee, Ju Hyun;Kim, Mi Jeong
    • Korean Institute of Interior Design Journal
    • /
    • v.21 no.2
    • /
    • pp.186-196
    • /
    • 2012
  • Information technology has changed the human life as well as the societal and economic paradigm. New office environments have been proposed to cope with emerging changes and to support working performances by reducing costs of office operation and business. Recently, office environments have adopted ubiquitous computing with a focus on collaboration to promote real-time enterprises. They become equipped with various mobile devices and pervasive technologies in wireless networks. This study aims to propose a direction for the adoption of mobile and pervasive computing on the new office environment. We investigate relate works and analyze new office types including mobile offices, telework centers and home offices. Using a customized questionnaire, the current conditions of the office environments and officers' demands were investigated and analyzed. In the end, we propose the direction for a ubiquitous office environment with a focus on two attributes, ubiquity and mobility. This research will be a basis for the development of ubiquitous offices that support the professionalism of works in practices.

  • PDF

An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

  • Xiong, Ling;Peng, Daiyuan;Peng, Tu;Liang, Hongbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6169-6187
    • /
    • 2017
  • With the fast growth of mobile services, Mobile Cloud Computing(MCC) has gained a great deal of attention from researchers in the academic and industrial field. User authentication and privacy are significant issues in MCC environment. Recently, Tsai and Lo proposed a privacy-aware authentication scheme for distributed MCC services, which claimed to support mutual authentication and user anonymity. However, Irshad et.al. pointed out this scheme cannot achieve desired security goals and improved it. Unfortunately, this paper shall show that security features of Irshad et.al.'s scheme are achieved at the price of multiple time-consuming operations, such as three bilinear pairing operations, one map-to-point hash function operation, etc. Besides, it still suffers from two minor design flaws, including incapability of achieving three-factor security and no user revocation and re-registration. To address these issues, an enhanced and provably secure authentication scheme for distributed MCC services will be designed in this work. The proposed scheme can meet all desirable security requirements and is able to resist against various kinds of attacks. Moreover, compared with previously proposed schemes, the proposed scheme provides more security features while achieving lower computation and communication costs.

A Privacy-preserving and Energy-efficient Offloading Algorithm based on Lyapunov Optimization

  • Chen, Lu;Tang, Hongbo;Zhao, Yu;You, Wei;Wang, Kai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2490-2506
    • /
    • 2022
  • In Mobile Edge Computing (MEC), attackers can speculate and mine sensitive user information by eavesdropping wireless channel status and offloading usage pattern, leading to user privacy leakage. To solve this problem, this paper proposes a Privacy-preserving and Energy-efficient Offloading Algorithm (PEOA) based on Lyapunov optimization. In this method, a continuous Markov process offloading model with a buffer queue strategy is built first. Then the amount of privacy of offloading usage pattern in wireless channel is defined. Finally, by introducing the Lyapunov optimization, the problem of minimum average energy consumption in continuous state transition process with privacy constraints in the infinite time domain is transformed into the minimum value problem of each timeslot, which reduces the complexity of algorithms and helps obtain the optimal solution while maintaining low energy consumption. The experimental results show that, compared with other methods, PEOA can maintain the amount of privacy accumulation in the system near zero, while sustaining low average energy consumption costs. This makes it difficult for attackers to infer sensitive user information through offloading usage patterns, thus effectively protecting user privacy and safety.