• Title/Summary/Keyword: Computing System

Search Result 5,890, Processing Time 0.03 seconds

A Study on the Data Security for Cloud Computing Infrastructure Development (클라우드 컴퓨팅 서비스 도입에 따른 데이터보안에 관한 연구)

  • Kyung, ji-hun;Jung, Sung-Jae;Bae, Yu-Mi;Park, Jeong-Su;Sung, Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.736-739
    • /
    • 2012
  • Cloud Computing is attracting attention are activated and rapidly spread to companies and public institutions, etc. have been introduced are getting. Spotlighted these effects due to the utilization and integration of information system using cloud computing technology resources, and the resulting data security issue has been. In this paper, the side lights on due to the introduction of a cloud computing system, the resources of information systems, data security, and knowledge to provide the foundation for cloud computing infrastructure.

  • PDF

Framework Design of Pervasive Computing System for Inter Space Interactions between Private and Public Smart Spaces

  • Lim, Shin-Young;Chung, Lawrence;Helal, Sumi;Yang, Hen-I
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.9 no.3
    • /
    • pp.198-205
    • /
    • 2009
  • In this paper, design of framework architecture of pervasive computing system providing seamless inter space interactions between private and public smart spaces is presented. The seamless inter space interaction issues are related to establishing user's service environment by allocating relevant resources in a new location where there are no prior settings for the user or where there are current users already being served in the new location. In the realm of pervasive computing, we can have different types of smart spaces, offering proactive and intelligent services, which are islands of smart spaces independent from each other. As users move about, they will have to roam from private smart space to public smart space and vice versa. When they enter a new island of smart space, they will have to setup their devices and service manually to get the same or different services they had at the previous location. Users might be living in a non-pervasive computing environment because this manual operation is inappropriate to its generic features of proactive and intelligent services of pervasive computing. The framework architecture will provide seamless inter space interactions initiated by changes in users' location to acquire negotiations of resources for new and current residents regarding service provision with limited available networked devices.

A Fundamental Study on the Planning of Classroom Space in the Ubiquitous Environments (유비쿼터스 환경의 교실 공간 계획에 관한 기초적 연구)

  • Cho, Hyun-Ho;Lee, Jae-Hoon
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.14 no.4
    • /
    • pp.4-13
    • /
    • 2007
  • In 21st century, mankind greets an era of ubiquitous computing where physical and virtual space are merged through the innovation of digital and IT(Information Technology), meanwhile ubiquitous computing and network paradigm suggest a new direction which our future educational system should head for. A society where people, computers, and objects can be connected with each other anytime and anywhere, that is, a society of ubiquitous computing where everything in our living space are interconnected by a immense network system may bring a variety of changes into our educational environment in schools. In this study I analysed the forecast of school educational orientation and ubiquitous educational environment and facilities in developed countries, and on the basis of the result, I performed a fundamental work for formation of a ubiquitous classroom environment which is feasible in Korea. In the section of conclusion, I present a model of ubiquitous classroom as a scenario based on ubiquitous computing technology applicable to future classroom environment.

Performance Analysis of a Composite Service Providing System in a Context-Aware Computing Environment (상황인지 컴퓨팅 환경에서 복합서비스를 제공하는 서비스시스템의 성능분석)

  • Nam, Jin-Gyu;Hur, Sun;Joo, Kuk-Sun;Shin, Dong-Min
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.35 no.1
    • /
    • pp.51-57
    • /
    • 2009
  • There are a variety of users and devices in a context-aware computing environment. In this environment, the service provided to a user may be the composition of diverse services rather than one independent service. Before user's devices provide the composite service to the user, they should perceive user's needs by gathering related information segments from other surrounding devices and/or sensors. We consider a context-aware computing environment providing composite and adapted service to users and propose an information processing model that characterizes the device where the collected data should be processed through services and/or applications. Based on this model, we provide an analytical tool to obtain some performance measures of the context-aware computing environment.

A Study on Improving the Reliability of Cloud Computing (클라우드 컴퓨팅의 신뢰성 향상 방안에 관한 연구)

  • Yang, Jeong Mo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.107-113
    • /
    • 2012
  • Cloud computing has brought changes to the IT environment. Due to the spread of LTE, users of cloud services are growing more. This which provides IT resources to meet the needs of users of cloud services are noted as a core industry. But it is not activated because of the security of personal data and the safety of the service. In order to solve this, intrusion detection system is constructed as follows. This protects individual data safely which exists in the cloud and also protects information exhaustively from malicious attack. The cause of most attack risk which exists to cloud computing can find in distributed environment. In this study, we analyzed about necessary property of network-based intrusion detection system that process and analyze large amount of data which occur in cloud computing environment. Also, we studied functions which detect and correspond attack occurred in interior of virtualization.

Proactive Friend Recommendation Method using Social Network in Pervasive Computing Environment (퍼베이시브 컴퓨팅 환경에서 소셜네트워크를 이용한 프로액티브 친구 추천 기법)

  • Kwon, Joon Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.43-52
    • /
    • 2013
  • Pervasive computing and social network are good resources in recommendation method. Collaborative filtering is one of the most popular recommendation methods, but it has some limitations such as rating sparsity. Moreover, it does not consider social network in pervasive computing environment. We propose an effective proactive friend recommendation method using social network and contexts in pervasive computing environment. In collaborative filtering method, users need to rate sufficient number of items. However, many users don't rate items sufficiently, because the rating information must be manually input into system. We solve the rating sparsity problem in the collaboration filtering method by using contexts. Our method considers both a static and a dynamic friendship using contexts and social network. It makes more effective recommendation. This paper describes a new friend recommendation method and then presents a music friend scenario. Our work will help e-commerce recommendation system using collaborative filtering and friend recommendation applications in social network services.

Integration Architecture for Virtualized Naval Shipboard Computing Systems

  • Kim, Hongjae;Oh, Sangyoon
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.1
    • /
    • pp.1-11
    • /
    • 2013
  • Various computing systems are used in naval ships. Since each system has a single purpose and its applications are tightly coupled with the physical machine, applications cannot share physical resources with each other. It is hard to utilize resources efficiently in conventional naval shipboard computing environment. In this paper, we present an integration architecture for virtualized naval shipboard computing systems based on open architecture. Our proposed architecture integrates individual computing resources into one single integrated hardware pool so that the OS and applications are encapsulated as a VM. We consider the issue of varying needs of all applications in a naval ship that have different purposes, priorities and requirements. We also present parallel VM migration algorithm that improves the process time of resource reallocation of given architecture. The evaluation results with the prototype system show that our algorithm performs better than conventional resource reallocation algorithm in process time.

A study on the vulnerability and corresponding technique trends of the cloud computing service (클라우드 컴퓨팅 서비스의 취약성과 대응기술 동향에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.17-24
    • /
    • 2013
  • Recently, the cloud computing technology is emerging as an important issue in the world, and In the technology and services has attracted much attention. However, the positive aspects of cloud computing unlike the includes several vulnerabilities. For this reason, the hacking techniques according to the evolution of a variety of attacks and damages is expected. Therefore, this paper will be analyzed through case studies and experiments to the security technology trends of the cloud computing. and In the future, this is expected to be utilized as a basis for the security system design and corresponding technology development.

A Multi-Layered Approach to Assessing Level of Ubiquitous Computing Services for Ubiquitous Intelligence Design

  • Kwon, Oh-Byung;Kim, Ji-Hoon
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.05a
    • /
    • pp.121-130
    • /
    • 2005
  • The evaluation of ubiquitous computing service is the important work for preparing the commercialization of the ubiquitous business services in which ubiquitous intelligence (ubitelligence) is embedded. However, the methodology for evaluating ubiquitous computing services has not been developed enough. Even the study of making a distinction what is 'ubiquitous' or not is insufficient yet. Hence, this paper aims to propose an integrated methodology to assess the ubiquitous computing services. A multi-layered approach is adopted to assess not only technical but also behavioral service levels.

  • PDF

Realtime Monitoring and Visualization for PDP System (PDP 시스템의 실시간 모니터링 및 시각화)

  • 김수자;송은하;박복자;정영식
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.5
    • /
    • pp.755-765
    • /
    • 2004
  • Recently, the Internet-based distributed/parallel computing using many of idle hosts has been demonstrated its usefulness for processings of a large-scale task and involving several important issues. While executing a large-scale task, the realtime monitoring is required for adaptive strategy of the performance and state change of host. This paper provides the realtime monitoring and visualization on global computing infrastructure called PDP(Parallel Distributed Processing) which is a parallel computing framework implemented with Jana for parallel computing on the Internet.

  • PDF