• 제목/요약/키워드: Computing devices

검색결과 1,377건 처리시간 0.026초

Tunneling Field-Effect Transistors for Neuromorphic Applications

  • Lee, Jang Woo;Woo, Jae Seung;Choi, Woo Young
    • Journal of Semiconductor Engineering
    • /
    • 제2권3호
    • /
    • pp.142-153
    • /
    • 2021
  • Recent research on synaptic devices has been reviewed from the perspective of hardware-based neuromorphic computing. In addition, the backgrounds of neuromorphic computing and two training methods for hardware-based neuromorphic computing are described in detail. Moreover, two types of memristor- and CMOS-based synaptic devices were compared in terms of both the required performance metrics and low-power applications. Based on a review of recent studies, additional power-scalable synaptic devices such as tunnel field-effect transistors are suggested for a plausible candidate for neuromorphic applications.

A Secure Subscription-Push Service Scheme Based on Blockchain and Edge Computing for IoT

  • Deng, Yinjuan;Wang, Shangping;Zhang, Qian;Zhang, Duo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권2호
    • /
    • pp.445-466
    • /
    • 2022
  • As everything linking to the internet, people can subscribe to various services from a service provider to facilitate their lives through the Internet of Things (IoT). An obligatory thing for the service provider is that they should push the service data safely and timely to multiple IoT terminal devices regularly after the IoT devices accomplishing the service subscription. In order to control the service message received by the legal devices as while as keep the confidentiality of the data, the public key encryption algorithm is utilized. While the existing public encryption algorithms for push service are too complicated for IoT devices, and almost of the current subscription schemes based on push mode are relying on centralized organization which may suffer from centralized entity corruption or single point of failure. To address these issues, we design a secure subscription-push service scheme based on blockchain and edge computing in this article, which is decentralized with secure architecture for the subscription and push of service. Furthermore, inspired by broadcast encryption and multicast encryption, a new encryption algorithm is designed to manage the permissions of IoT devices together with smart contract, and to protect the confidentiality of push messages, which is suitable for IoT devices. The edge computing nodes, in the new system architecture, maintain the blockchain to ensure the impartiality and traceability of service subscriptions and push messages, meanwhile undertake some calculations for IoT devices with limited computing power. The legalities of subscription services are guaranteed by verifying subscription tags on the smart contract. Lastly, the analysis indicates that the scheme is reliable, and the proposed encryption algorithm is safe and efficient.

스마트 디바이스로 구성된 클러스터를 위한 상대속도 기반 작업 분배 기법 (Relative Speed based Task Distribution Algorithm for Smart Device Cluster)

  • 이재훈;강수용
    • 한국차세대컴퓨팅학회논문지
    • /
    • 제13권3호
    • /
    • pp.60-71
    • /
    • 2017
  • 스마트 폰, 스마트 TV, 스마트 패드 등의 스마트 디바이스는 최근 없어서는 안 될 필수적인 기기가 되었다. 인기가 많아지고 수요가 늘어감에 따라 스마트 디바이스의 성능 또한 점차 좋아져 교육, 비즈니스 등 많은 일을 처리하기 위해 번거로운 데스크탑 PC 대신 스마트 디바이스를 선택하는 사용자들이 늘어나고 있다. 그러나 성능이 좋아졌다해도 여전히 데스크탑 PC에 비해 부족한 성능을 지닌 스마트 디바이스는 제한된 자원으로 인해 고성능을 요구하는 어플리케이션을 실행하는데 어려움을 겪고 있다. 본 논문에서는 스마트 디바이스의 자원 제한을 극복하기 위한 방법으로 주변 스마트 디바이스의 자원 활용 시 발생할 수 있는 문제점과 고려해야 할 사항에 대해 살펴보고, 스마트 디바이스의 특성을 적용한 작업 분배 알고리즘을 제안한다. 알고리즘을 검증하기 위해 안드로이드 플랫폼 내 분산 처리 시스템 서비스를 추가 후 알고리즘을 구현하였고, 스마트 디바이스에 탑재해 클러스터를 구성 후 다양한 실험을 진행했다. 실험 결과 분석을 통해 본 논문에서 제안하는 알고리즘은 노드 간 성능이 균일하지 않은 클러스터에서도 각 노드의 성능을 파악해 서로 다른 양의 작업을 분배함으로써 전체적인 분산 처리 성능이 효율적으로 향상된다는 것을 확인할 수 있었다.

상황인지 컴퓨팅 환경에서 복합서비스를 제공하는 서비스시스템의 성능분석 (Performance Analysis of a Composite Service Providing System in a Context-Aware Computing Environment)

  • 남진규;허선;주국선;신동민
    • 대한산업공학회지
    • /
    • 제35권1호
    • /
    • pp.51-57
    • /
    • 2009
  • There are a variety of users and devices in a context-aware computing environment. In this environment, the service provided to a user may be the composition of diverse services rather than one independent service. Before user's devices provide the composite service to the user, they should perceive user's needs by gathering related information segments from other surrounding devices and/or sensors. We consider a context-aware computing environment providing composite and adapted service to users and propose an information processing model that characterizes the device where the collected data should be processed through services and/or applications. Based on this model, we provide an analytical tool to obtain some performance measures of the context-aware computing environment.

A Survey of Computational Offloading in Cloud/Edge-based Architectures: Strategies, Optimization Models and Challenges

  • Alqarni, Manal M.;Cherif, Asma;Alkayal, Entisar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권3호
    • /
    • pp.952-973
    • /
    • 2021
  • In recent years, mobile devices have become an essential part of daily life. More and more applications are being supported by mobile devices thanks to edge computing, which represents an emergent architecture that provides computing, storage, and networking capabilities for mobile devices. In edge computing, heavy tasks are offloaded to edge nodes to alleviate the computations on the mobile side. However, offloading computational tasks may incur extra energy consumption and delays due to network congestion and server queues. Therefore, it is necessary to optimize offloading decisions to minimize time, energy, and payment costs. In this article, different offloading models are examined to identify the offloading parameters that need to be optimized. The paper investigates and compares several optimization techniques used to optimize offloading decisions, specifically Swarm Intelligence (SI) models, since they are best suited to the distributed aspect of edge computing. Furthermore, based on the literature review, this study concludes that a Cuckoo Search Algorithm (CSA) in an edge-based architecture is a good solution for balancing energy consumption, time, and cost.

Highly Secure Mobile Devices Assisted with Trusted Cloud Computing Environments

  • Oh, Doohwan;Kim, Ilkyu;Kim, Keunsoo;Lee, Sang-Min;Ro, Won Woo
    • ETRI Journal
    • /
    • 제37권2호
    • /
    • pp.348-358
    • /
    • 2015
  • Mobile devices have been widespread and become very popular with connectivity to the Internet, and a lot of desktop PC applications are now aggressively ported to them. Unfortunately, mobile devices are often vulnerable to malicious attacks due to their common usage and connectivity to the Internet. Therefore, the demands on the development of mobile security systems increase in accordance with advances in mobile computing. However, it is very hard to run a security program on a mobile device all of the time due the device's limited computational power and battery life. To overcome these problems, we propose a novel mobile security scheme that migrates heavy computations on mobile devices to cloud servers. An efficient data transmission scheme for reducing data traffic between devices and servers over networks is introduced. We have evaluated the proposed scheme with a mobile device in a cloud environment, whereby it achieved a maximum speedup of 13.4 compared to a traditional algorithm.

유비쿼터스 컴퓨팅 환경에서의 익명성을 보장하는 사용자 인증 및 키 동의 프로토콜 설계 (Design of Anonymity-Preserving User Authentication and Key Agreement Protocol in Ubiquitous Computing Environments)

  • 강명희;유황빈
    • 정보보호학회논문지
    • /
    • 제16권2호
    • /
    • pp.3-12
    • /
    • 2006
  • 모바일 디바이스, PDA, 센서들의 확산은 실생활 공간이 지능적이고 향상된 서비스를 제공하는 스마트 공간으로 전환되는 유비쿼터스 컴퓨팅 환경이 구축될 수 있도록 하였다. 그러나 모바일 디바이스, PDA, 센서들과 같은 다양한 유비쿼터스 디바이스들의 초기 설계 단계부터 프라이버시 문제를 고려하지 않는다면 유비쿼터스 감시체제가 구축될 위험성이 있다. 또한 유비쿼터스 컴퓨팅 환경에서의 다양한 디바이스들은 대체로 컴퓨팅 연산 능력이 적기 때문에, 공개키 기반의 암호기술을 적용하는 것은 부적절할 수 있다. 본 논문에서는 유비쿼터스 컴퓨팅 환경에서의 사용자 프라이버시를 위하여 익명성이 보장되고, 컴퓨팅 연산 능력이 적은 디바이스를 위한 효율적인 사용자 인증 및 키 동의 프로토콜을 제안한다.

Dynamic Scheduling Method for Cooperative Resource Sharing in Mobile Cloud Computing Environments

  • Kwon, Kyunglag;Park, Hansaem;Jung, Sungwoo;Lee, Jeungmin;Chung, In-Jeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권2호
    • /
    • pp.484-503
    • /
    • 2016
  • Mobile cloud computing has recently become a new paradigm for the utilization of a variety of shared mobile resources via wireless network environments. However, due to the inherent characteristics of mobile devices, a limited battery life, and a network access requirement, it is necessary for mobile servers to provide a dynamic approach for managing mobile resources efficiently in mobile cloud computing environments. Since on-demand job requests occur frequently and the number of mobile devices is drastically increased in mobile cloud computing environments, a different mobile resource management method is required to maximize the computational power. In this paper, we therefore propose a cooperative, mobile resource sharing method that considers both the inherent properties and the number of mobile devices in mobile cloud environments. The proposed method is composed of four main components: mobile resource monitor, job handler, resource handler, and results consolidator. In contrast with conventional mobile cloud computing, each mobile device under the proposed method can be either a service consumer or a service provider in the cloud. Even though each device is resource-poor when a job is processed independently, the computational power is dramatically increased under the proposed method, as the devices cooperate simultaneously for a job. Therefore, the mobile computing power throughput is dynamically increased, while the computation time for a given job is reduced. We conduct case-based experiments to validate the proposed method, whereby the feasibility of the method for the purpose of cooperative computation is shown.

에지 컴퓨팅 환경을 위한 IoT와 에지 장치 간 키 동의 프로토콜 (Key-Agreement Protocol between IoT and Edge Devices for Edge Computing Environments)

  • 최정희
    • 융합정보논문지
    • /
    • 제12권2호
    • /
    • pp.23-29
    • /
    • 2022
  • 최근 사물인터넷(Internet of Things, IoT) 기기 사용 증가로 인해 클라우드 컴퓨팅 서버로 전송해 처리하는 데이터양이 급증하고, 그 결과 네트워크 관련 문제점(지연, 서버의 과부하 및 보안 위협)들이 크게 대두되고 있다. 특히, 연산 능력이 클라우드 컴퓨팅보다 낮은 에지 컴퓨팅은 수많은 IoT 기기들을 손쉽게 인증할 수 있는 경량화된 인증 알고리즘이 필요하다. 본 논문에서는 IoT와 에지 장치 간 익명성과 순방향·역방향의 비밀성을 보장하고 중간자 공격과 재전송 공격에 안정적이며, 에지 장치와 IoT 기기 특성에 적합한 경량화 알고리즘의 키 동의 프로토콜을 제안하였고, 제안한 키 동의 프로토콜을 기존 연구와 비교·분석한 결과 IoT 기기와 에지 장치에서 효율적으로 사용 가능한 경량화 프로토콜임을 보였다.

Security, Privacy, and Efficiency of Sustainable Computing for Future Smart Cities

  • Jeong, Young-Sik;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • 제16권1호
    • /
    • pp.1-5
    • /
    • 2020
  • Sustainable computing is a rapidly expanding field of research covering the fields of multidisciplinary engineering. With the rapid adoption of Internet of Things (IoT) devices, issues such as security, privacy, efficiency, and green computing infrastructure are increasing day by day. To achieve a sustainable computing ecosystem for future smart cities, it is important to take into account their entire life cycle from design and manufacturing to recycling and disposal as well as their wider impact on humans and the places around them. The energy efficiency aspects of the computing system range from electronic circuits to applications for systems covering small IoT devices up to large data centers. This editorial focuses on the security, privacy, and efficiency of sustainable computing for future smart cities. This issue accepted 17 articles after a rigorous review process.