• Title/Summary/Keyword: Computing Resource

Search Result 859, Processing Time 0.024 seconds

Data Processing Architecture for Cloud and Big Data Services in Terms of Cost Saving (비용절감 측면에서 클라우드, 빅데이터 서비스를 위한 대용량 데이터 처리 아키텍쳐)

  • Lee, Byoung-Yup;Park, Jae-Yeol;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.5
    • /
    • pp.570-581
    • /
    • 2015
  • In recent years, many institutions predict that cloud services and big data will be popular IT trends in the near future. A number of leading IT vendors are focusing on practical solutions and services for cloud and big data. In addition, cloud has the advantage of unrestricted in selecting resources for business model based on a variety of internet-based technologies which is the reason that provisioning and virtualization technologies for active resource expansion has been attracting attention as a leading technology above all the other technologies. Big data took data prediction model to another level by providing the base for the analysis of unstructured data that could not have been analyzed in the past. Since what cloud services and big data have in common is the services and analysis based on mass amount of data, efficient operation and designing of mass data has become a critical issue from the early stage of development. Thus, in this paper, I would like to establish data processing architecture based on technological requirements of mass data for cloud and big data services. Particularly, I would like to introduce requirements that must be met in order for distributed file system to engage in cloud computing, and efficient compression technology requirements of mass data for big data and cloud computing in terms of cost-saving, as well as technological requirements of open-source-based system such as Hadoop eco system distributed file system and memory database that are available in cloud computing.

Fat Client-Based Abstraction Model of Unstructured Data for Context-Aware Service in Edge Computing Environment (에지 컴퓨팅 환경에서의 상황인지 서비스를 위한 팻 클라이언트 기반 비정형 데이터 추상화 방법)

  • Kim, Do Hyung;Mun, Jong Hyeok;Park, Yoo Sang;Choi, Jong Sun;Choi, Jae Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.3
    • /
    • pp.59-70
    • /
    • 2021
  • With the recent advancements in the Internet of Things, context-aware system that provides customized services become important to consider. The existing context-aware systems analyze data generated around the user and abstract the context information that expresses the state of situations. However, these datasets is mostly unstructured and have difficulty in processing with simple approaches. Therefore, providing context-aware services using the datasets should be managed in simplified method. One of examples that should be considered as the unstructured datasets is a deep learning application. Processes in deep learning applications have a strong coupling in a way of abstracting dataset from the acquisition to analysis phases, it has less flexible when the target analysis model or applications are modified in functional scalability. Therefore, an abstraction model that separates the phases and process the unstructured dataset for analysis is proposed. The proposed abstraction utilizes a description name Analysis Model Description Language(AMDL) to deploy the analysis phases by each fat client is a specifically designed instance for resource-oriented tasks in edge computing environments how to handle different analysis applications and its factors using the AMDL and Fat client profiles. The experiment shows functional scalability through examples of AMDL and Fat client profiles targeting a vehicle image recognition model for vehicle access control notification service, and conducts process-by-process monitoring for collection-preprocessing-analysis of unstructured data.

Comparative Analysis of Policies to Vitalize Spectrum Sharing Ecosystem using System Dynamics (시스템 다이내믹스를 이용한 주파수 공유 생태계 활성화 정책대안 비교 분석 연구)

  • Song, Hee Seok;Kim, Jae Kyung;Kim, Taehan
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.4_spc
    • /
    • pp.431-447
    • /
    • 2014
  • Demand of spectrum resource is tremendously increasing and this trend will continue as more IT services such as cloud computing, smart devices, Internet of Things are provided through wireless network. Recent development of spectrum sharing technology has drawn attention to spectrum policy makers as a promising way to overcome the expected spectrum shortage problem. However, technology-based solution to spectrum shortage problem may not be sustainable since the solution affect only one aspect of spectrum sharing ecosystem. To understand the whole picture of spectrum shortage problem, policies to vitalize spectrum sharing ecosystem were proposed based on the analysis of System Dynamics causal map in the previous study. This study compares and analyzes the effect of those proposed vitalization policies by using System Dynamics simulation. Among seven alternative policies, combined application of demand acceleration policy and technology development policy was found to be more effective for better utilization of spectrum. The effect of demand acceleration policy was offset when other policies are applied together except supply acceleration policy which shows better spectrum sharing.

The Implementation of Application Services Using CSCFs of Management (CSCF 노드 관리를 이용한 응용 서비스 구현)

  • Lee, Jae-Oh;Cho, Jae-Hyoung
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.33-40
    • /
    • 2012
  • Recently, according to increasing the network traffic in the IMS, the role of Network Management System (NMS) is very important because of limited network resource. NMS can perform two kinds of routing ways with the capability of static or dynamic routing. The way of A dynamic routing is more efficient than static routing one because it can make the flow of traffic changeful among nodes in the IMS. Therefore, in this paper, we suggest a management function of NMS, using a dynamic routing algorithm for managing the CSCFs in the IMS. And then we analyze the algorithm by measuring the performance of PoC, one of the prominent application services to be deployed in the IMS.

Business Intelligence and Marketing Insights in an Era of Big Data: The Q-sorting Approach

  • Kim, Ki Youn
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.567-582
    • /
    • 2014
  • The purpose of this study is to qualitatively identify the typologies and characteristics of the big data marketing strategy in major companies that are taking advantage of the big data business in Korea. Big data means piles accumulated from converging platforms such as computing infrastructures, smart devices, social networking and new media, and big data is also an analytic technique itself. Numerous enterprises have grown conscious that big data can be a most significant resource or capability since the issue of big data recently surfaced abruptly in Korea. Companies will be obliged to design their own implementing plans for big data marketing and to customize their own analytic skills in the new era of big data, which will fundamentally transform how businesses operate and how they engage with customers, suppliers, partners and employees. This research employed a Q-study, which is a methodology, model, and theory used in 'subjectivity' research to interpret professional panels' perceptions or opinions through in-depth interviews. This method includes a series of q-sorting analysis processes, proposing 40 stimuli statements (q-sample) compressed out of about 60 (q-population) and explaining the big data marketing model derived from in-depth interviews with 20 marketing managers who belong to major companies(q-sorters). As a result, this study makes fundamental contributions to proposing new findings and insights for small and medium-size enterprises (SMEs) and policy makers that need guidelines or direction for future big data business.

Mobile Cloud Computing-based Agent Application Model (모바일 클라우드 기반 에이전트 모델)

  • Ahn, Kwang-Min;Lee, Bong-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.608-611
    • /
    • 2012
  • In this paper, a mobile cloud-based agent model is proposed in order to overcome the resource constraints and the difficulties of installing a variety of complex applications in mobile devices. The proposed software architecture overcomes the disadvantages of mobile devices and maximizes usage of cloud services by implementing the function of mobile agent concept. The significant portion of the cloud services is run in the cloud server and the client application implemented in the mobile device can call and control appropriate service from the cloud server. Thus, the inherent weakness of the mobile can be overcome by executing the target applications on cloud nodes.

  • PDF

Client Collaboration for Power and Interference Reduction in Wireless Cellular Communication

  • Nam, Hyungju;Jung, Minchae;Hwang, Kyuho;Choi, Sooyong
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.2
    • /
    • pp.117-124
    • /
    • 2012
  • A client collaboration (CC) system is proposed for a user relay system. The proposed scheme focuses on the management of transmit power and leakage interference. In the proposed CC system, edge users transmit signals to the masters considered as user relays. The masters relay the signals of the edge users to the base station using the resource blocks (RBs) that are assigned to the edge users. The leakage interference and power consumption were analyzed in the CC system. In addition, an optimal master location problem was formulated based on the signal-to-leakage-plus-noise ratio (SLNR). Because the optimal master location problem is quite complex, a sub-optimal master location problem was proposed and a closed-form sub-optimal master location was obtained. The edge users generate smaller leakage interference and power consumption in the proposed CC system compared to the system without the CC. The numerical results showed that the edge users generate smaller leakage interference and power consumption in the proposed CC system compared to the system without the CC, and the average throughput increases.

  • PDF

An Identity-based Ring Signcryption Scheme: Evaluation for Wireless Sensor Networks

  • Sharma, Gaurav;Bala, Suman;Verma, Anil K.
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.2
    • /
    • pp.57-66
    • /
    • 2013
  • Wireless Sensor Networks consist of small, inexpensive, low-powered sensor nodes that communicate with each other. To achieve a low communication cost in a resource constrained network, a novel concept of signcryption has been applied for secure communication. Signcryption enables a user to perform a digital signature for providing authenticity and public key encryption for providing message confidentiality simultaneously in a single logical step with a lower cost than that of the sign-then-encrypt approach. Ring signcryption maintains the signer's privacy, which is lacking in normal signcryption schemes. Signcryption can provide confidentiality and authenticity without revealing the user's identity of the ring. This paper presents the security notions and an evaluation of an ID-based ring signcryption scheme for wireless sensor networks. The scheme has been proven to be better than the existing schemes. The proposed scheme was found to be secure against adaptive chosen ciphertext ring attacks (IND-IDRSC-CCA2) and secure against an existential forgery for adaptive chosen message attacks (EF-IDRSC-ACMA). The proposed scheme was found to be more efficient than scheme for Wireless Sensor Networks reported by Qi. et al. based on the running time and energy consumption.

  • PDF

A Study on a Packet Forwarding Scheme based on Interworking Architecture (연동 구조 기반의 패킷 포워딩 기법에 대한 연구)

  • Kim, Seok-Hoon;Ryoo, In-Tae
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.97-106
    • /
    • 2005
  • Generally, network QoS is determined by timeliness, bandwidth, and reliability, As IT technologies are growing day by day, the bandwidth and reliability factors are expected to be able to satisfy user's requirements. The timeliness factor, however, has not fully met user's requirements yet. In this paper, we propose a packet forwarding scheme named POSIA (Packet forwarding Scheme based on Interworking Architecture) that can provide quite a good QoS (quality of service) by minimizing processing time which is the major part of the timeliness factor. Based on path and resource reservation mechanism, the proposed POSIA makes routers on the packet forwarding path synchronize with each other and then forward packets, The POSIA has been verified to outperform the existing MPLS packet forwarding scheme through computer simulations using OPNET.

  • PDF

Admission Control Policy Heuristic Algorithm for fairness of Call Blocking Probability in Differentiated Service Networks (차별화된 서비스를 갖는 인터넷 망에서 호 블로킹 확률의 공평성을 위한 수락 제어 정책 Heuristic 알고리즘 연구)

  • Min, Jun-Ki;Rhea, Woo-Seop;Chung, Jong-Soo
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.121-128
    • /
    • 2005
  • Recently, as the research of effective resource management for supporting of various next generation internet service, the admission control mechanisms using the dynamic provisioning methods in differentiated service networks are studied. However, even though admission control mechanism is applied to the network, there exits the unfairness of call blocking probability among the different bandwidth requested services. In this paper, we propose the new admission control policy heuristic algorithm that provides fairness of call blocking probability between the large bandwidth requested service and the small bandwidth requested service. The simulation results show that the proposed algorithm provides not only blocking probability fairness but also high bandwidth utilization.

  • PDF