• Title/Summary/Keyword: Computing Resource

Search Result 852, Processing Time 0.029 seconds

Emotion Recognition of Low Resource (Sindhi) Language Using Machine Learning

  • Ahmed, Tanveer;Memon, Sajjad Ali;Hussain, Saqib;Tanwani, Amer;Sadat, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.369-376
    • /
    • 2021
  • One of the most active areas of research in the field of affective computing and signal processing is emotion recognition. This paper proposes emotion recognition of low-resource (Sindhi) language. This work's uniqueness is that it examines the emotions of languages for which there is currently no publicly accessible dataset. The proposed effort has provided a dataset named MAVDESS (Mehran Audio-Visual Dataset Mehran Audio-Visual Database of Emotional Speech in Sindhi) for the academic community of a significant Sindhi language that is mainly spoken in Pakistan; however, no generic data for such languages is accessible in machine learning except few. Furthermore, the analysis of various emotions of Sindhi language in MAVDESS has been carried out to annotate the emotions using line features such as pitch, volume, and base, as well as toolkits such as OpenSmile, Scikit-Learn, and some important classification schemes such as LR, SVC, DT, and KNN, which will be further classified and computed to the machine via Python language for training a machine. Meanwhile, the dataset can be accessed in future via https://doi.org/10.5281/zenodo.5213073.

Restoring Motion Capture Data for Pose Estimation (자세 추정을 위한 모션 캡처 데이터 복원)

  • Youn, Yeo-su;Park, Hyun-jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.5-7
    • /
    • 2021
  • Motion capture data files for pose estimation may have inaccurate data depending on the surrounding environment and the degree of movement, so it is necessary to correct it. In the past, inaccurate data was restored with post-processing by people, but recently various kind of neural networks such as LSTM and R-CNN are used as automated method. However, since neural network-based data restoration methods require a lot of computing resource, this paper proposes a method that reduces computing resource and maintains data restoration rate compared to neural network-based method. The proposed method automatically restores inaccurate motion capture data by using posture measurement data (c3d). As a result of the experiment, data restoration rates ranged from 89% to 99% depending on the degree of inaccuracy of the data.

  • PDF

Design of the Network Computer Architecture based on a Web Browser (웹 브라우저 기반의 네트워크 컴퓨터 아키텍쳐 설계)

  • Song, Min-Gyu
    • Journal of Digital Contents Society
    • /
    • v.9 no.4
    • /
    • pp.607-616
    • /
    • 2008
  • By the advancement of computer & network technology, the paridigm of 'Network Computer' has been realizing`. In what is called network computer, computer system and computing resource is incomparably seem to be expanded compared with conventional network technology[1]. Network connected computer system consitute a massive virtual computer, it is possible for people to use an enourmous amout of computing resource distributed widely through the network. It is also possible that we make client lightweight by the use of computer system & all shared computing resources on the network in our computer processing and we call this type of client system as thin-client. Thin-client and network computer are on and the same network paradigm in that both paradigm featuring the active use of computer system and resource on the network[2]. In network computer paragem, network itself is regarded as a basic platform for the transfer of application, so it is possible that client access remote serve system to run remote applications through the network[3]. In this paper, we propose the system architecture for the implementation of network computer by the use of Web browser, X window system and Pyjamas. By the use of network computer proposed in this paper, it is possible for people to run application on the server system as if he run local application, and it is expected to improve the security and maintenance efficiency.

  • PDF

A Cost-Efficient Job Scheduling Algorithm in Cloud Resource Broker with Scalable VM Allocation Scheme (클라우드 자원 브로커에서 확장성 있는 가상 머신 할당 기법을 이용한 비용 적응형 작업 스케쥴링 알고리즘)

  • Ren, Ye;Kim, Seong-Hwan;Kang, Dong-Ki;Kim, Byung-Sang;Youn, Chan-Hyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.1 no.3
    • /
    • pp.137-148
    • /
    • 2012
  • Cloud service users request dedicated virtual computing resource from the cloud service provider to process jobs in independent environment from other users. To optimize this process with automated method, in this paper we proposed a framework for workflow scheduling in the cloud environment, in which the core component is the middleware called broker mediating the interaction between users and cloud service providers. To process jobs in on-demand and virtualized resources from cloud service providers, many papers propose scheduling algorithms that allocate jobs to virtual machines which are dedicated to one machine one job. With this method, the isolation of being processed jobs is guaranteed, but we can't use each resource to its fullest computing capacity with high efficiency in resource utilization. This paper therefore proposed a cost-efficient job scheduling algorithm which maximizes the utilization of managed resources with increasing the degree of multiprogramming to reduce the number of needed virtual machines; consequently we can save the cost for processing requests. We also consider the performance degradation in proposed scheme with thrashing and context switching. By evaluating the experimental results, we have shown that the proposed scheme has better cost-performance feature compared to an existing scheme.

The feasibility and properties of dividing virtual machine resources using the virtual machine cluster as the unit in cloud computing

  • Peng, Zhiping;Xu, Bo;Gates, Antonio Marcel;Cui, Delong;Lin, Weiwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2649-2666
    • /
    • 2015
  • In the dynamic cloud computing environment, to ensure, under the terms of service-level agreements, the maximum efficiency of resource utilization, it is necessary to investigate the online dynamic management of virtual machine resources and their operational application systems/components. In this study, the feasibility and properties of the division of virtual machine resources on the cloud platform, using the virtual machine cluster as the management unit, are investigated. First, the definitions of virtual machine clusters are compared, and our own definitions are presented. Then, the feasibility of division using the virtual machine cluster as the management unit is described, and the isomorphism and reconfigurability of the clusters are proven. Lastly, from the perspectives of clustering and cluster segmentation, the dynamics of virtual machines are described and experimentally compared. This study aims to provide novel methods and approaches to the optimization management of virtual machine resources and the optimization configuration of the parameters of virtual machine resources and their application systems/components in large-scale cloud computing environments.

Implementation of Lightweight Block Cipher for Ubiquitous Computing Security (유비쿼터스 컴퓨팅 보안을 위한 경량 블록 암호 구현)

  • Kim, Sung-Hwan;Kim, Dong-Seong;Song, Young-Deog;Park, Jong-Sou
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.23-32
    • /
    • 2005
  • This paper presents a 128-bit Reversible Cellular Automata (RCA) based lightweight block cipher for Ubiquitous computing security. To satisfy resource-constraints for Ubiquitous computing, it is designed as block architecture based on Cellular Automata with high pseudo-randomness. Our implementation requires 704 clock cycles and consumes 2,874 gates for encryption of a 128-bit data block. In conclusion, the processing time outperformed that of AES and NTRU by 31%, and the number of gate was saved by 20%. We evaluate robustness of our implementation against both Differential Cryptanalysis and Strict Avalanche Criterion.

  • PDF

A Study on the Revitalization of High Performance Computing in Korea

  • Choi, Younkeun;Lee, Hyungjin;Jeong, Hyonam;Cho, Jaehyuk
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.129-136
    • /
    • 2016
  • Crucial aspects to successfully realizing the re-emergence of a contemporary and sustainable supercomputing community in South Korea will involve the devoted efforts and support from key government and R&D organizations. We suggest various supplementation plans regarding the roles of support for the statutory plan. This includes the committee and the plans which are often missing necessary support systems that help competent ministries to plan properly according to the missions of the research center. This dissertation suggests that adjustment in the HPC trends will depend upon exposing and correcting problems in the law as well as overall improvement of the law. Also, the total development of a super computing market is necessary. The results of these guidelines will create a spread of demand for supercomputing for national IT resource sharing, and will foster the development of supercomputer specialists worldwide. Other major end results include significant increases in research productivity and increased rates of product development.

A Study on the Business Service Design in Ubiquitous Computing:the Case Study in Bookstore (유비쿼터스 비즈니스 서비스 설계 사례연구 : 대형 도서매장을 중심으로)

  • Kim, Kyung-Kyu;Chang, Hang-Bae;Kim, Heung-Gook;Kwon, Hyuk-Jun
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.2
    • /
    • pp.165-179
    • /
    • 2008
  • In this study we designed the killer services for the scene of bookstore in ubiquitous computing. To achieve this study, we have explored the unmet needs of employees and users in bookstores and examined whether the unmet needs could be served by the resources and capabilities of ubiquitous computing. Then we have extracted detailed killer services that includes value propositions and resource map by using statistical methodology. Finally, the killer services were designed to serve employees and users in bookstores with the service architecture. The result of this study will be applied to develop new business model in ubiquitous computing as the basic research.

  • PDF

Scheduling Scheme for Cloud Computing based on Workflow Characteristics (클라우드 컴퓨팅에서 워크플로우의 특성을 고려한 스케줄링 기법)

  • Kim, Jeong-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.1-8
    • /
    • 2012
  • Cloud computing has got great popularity in recent times because users can easily access its resources as well as service providers can use efficiently use its resources. By the way, cloud computing are composed of heterogeneous resources and workflows of user application have various characteristics. So, the main goal of this paper is to design new efficient workflow scheduling algorithm, which classifies workflows through their importance degree and allocates resources to each workflow based on QoS metrics such as responsibility, cost and load balancing. Simulation results show that the proposed scheme can improve the responsibility as well as availability of resource.

Determinants of Software-as-a-Service Adoption Intention Among Small and Medium-sized Korean Firms (중소기업의 Software-as-a-Service 도입의도 결정요인 연구)

  • Kim, Sung-Hyun;Jang, Si-Young
    • Korean Management Science Review
    • /
    • v.30 no.2
    • /
    • pp.11-30
    • /
    • 2013
  • Small and medium-sized enterprises (SMEs) constitute an important part of current industrial economies. Information technologies can be useful strategic weapons for SMEs by enhancing their competitiveness. Categorized as one kind of cloud computing, SaaS is a computing resource and software sharing model which can be accessed via the Internet. Based on virtualization technology, SaaS is expected to improve the efficiency and quality of the IT service level in SMEs. This study attempts to identify the determinants of SaaS adoption intention among Korean SMEs. Through the lens of the theory of planned behavior, this study adopts technological, organizational, environmental factors to explore the determinants of cloud computing adoption intention. The research population is the SMEs that have been funded by the Korean government. Partial least square method was used for empirical analysis of 190 samples collected through on-line survey. The results show that the positive attitude is influenced by business process improvements. Vender support and top management support are positively associated with subjective norm. Vendor support, top management support can relieve perceived behavior control factors. Government support directly influences adoption intention of cloud computing. These findings can provide useful strategy for both SMEs and vendors of SaaS.