• Title/Summary/Keyword: Computing technology

검색결과 4,129건 처리시간 0.03초

Quantum Computing Impact on SCM and Hotel Performance

  • Adhikari, Binaya;Chang, Byeong-Yun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권2호
    • /
    • pp.1-6
    • /
    • 2021
  • For competitive hotel business, the hotel must have a sound prediction capability to balance the demand and supply of hospitality products. To have a sound prediction capability in the hotel, it should be prepared to be equipped with a new technology such as quantum computing. The quantum computing is a brand new cutting-edge technology. It will change hotel business and even the whole world too. Therefore, we study the impact of quantum computing on supply chain management (SCM) and hotel performance. Toward the goal we have developed the research model including six constructs: quantum (computing) prediction, communication, supplier relationship, service quality, non-financial performance, and financial performance. The result of the study shows a significant influence of quantum (computing) prediction on hotel performance through the mediating role of SCM in the hotel. Quantum prediction is highly significant in enhancing the SCM in the hotel. However, the direct effect between the quantum prediction and hotel performance is not significant. The finding indicates that hotels which would install the quantum computing technology and utilize the quantum prediction could hugely benefit from the performance improvement.

가상화 기술의 취약점을 이용한 공격 대응에 관한 연구 (A Study against Attack using Virtualization Weakness)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제8권3호
    • /
    • pp.57-64
    • /
    • 2012
  • Computing environment combined with development of internet and IT technology is changing to cloud computing environment. In addition, cloud computing is revitalized more because of propagation of LTE and suggestion of N-screen Service. Virtualization is the point technology for suggest IT resource to service form to users in this cloud computing. This technology combines other system physically or divides one system logically and uses resource efficiently. Many users can be provided application and hardware as needed using this. But, lately various attack using weak point of virtualization technology are increasing rapidly. In this study, we analyze type and weak point of virtualization technology, the point of cloud computing. And we study about function and the position which intrusion detection system has to prepare in order to detect and block attack using this.

Ubiquitous Computing을 적용한 건축디자인에 관한 연구 (A Study on the Design of Architecture on the Application of Ubiquitous Computing)

  • 손현석;권영;김용성
    • 한국실내디자인학회:학술대회논문집
    • /
    • 한국실내디자인학회 2003년도 춘계학술발표대회 논문집
    • /
    • pp.200-203
    • /
    • 2003
  • Ubiquitous Computing proposed technology for Next age be presented useful function and easier access by information technology that have existed just online move into physical space. Ubiquitous Computing described 'Anytime, Anywhere, Any device' is Intelligent Environment that help human life in hidden area. This study aimed to search that analyzed what find concept and technical peculiarity in Ubiquitous Computing on architectural vision for demanded elements in architectural design during creating space.

  • PDF

Toward High Utilization of Heterogeneous Computing Resources in SNP Detection

  • Lim, Myungeun;Kim, Minho;Jung, Ho-Youl;Kim, Dae-Hee;Choi, Jae-Hun;Choi, Wan;Lee, Kyu-Chul
    • ETRI Journal
    • /
    • 제37권2호
    • /
    • pp.212-221
    • /
    • 2015
  • As the amount of re-sequencing genome data grows, minimizing the execution time of an analysis is required. For this purpose, recent computing systems have been adopting both high-performance coprocessors and host processors. However, there are few applications that efficiently utilize these heterogeneous computing resources. This problem equally refers to the work of single nucleotide polymorphism (SNP) detection, which is one of the bottlenecks in genome data processing. In this paper, we propose a method for speeding up an SNP detection by enhancing the utilization of heterogeneous computing resources often used in recent high-performance computing systems. Through the measurement of workload in the detection procedure, we divide the SNP detection into several task groups suitable for each computing resource. These task groups are scheduled using a window overlapping method. As a result, we improved upon the speedup achieved by previous open source applications by a magnitude of 10.

User Authentication Technology using Multiple SSO in the Cloud Computing Environment

  • Cho, Min-Hee;Jang, Eun-Gyeom;Choi, Yong-Rak
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권4호
    • /
    • pp.31-38
    • /
    • 2016
  • The interface between servers and clients and system management in the cloud computing environment is different from the existing computing environment. The technology for information protection. Management and user authentication has become an important issue. For providing a more convenient service to users, SSO technology is applied to this cloud computing service. In the SSO service environment, system access using a single key facilitates access to several servers at the same time. This SSO authentication service technology is vulnerable to security of several systems, once the key is exposed. In this paper, we propose a technology to solve problems, which might be caused by single key authentication in SSO-based cloud computing access. This is a distributed agent authentication technology using a multiple SSO agent to reinforce user authentication using a single key in the SSO service environment. For user authentication reinforcement, phased access is applied and trackable log information is used when there is a security problem in system to provide a safe cloud computing service.

클라우드 컴퓨팅 환경에서의 프로젝트 수행 성과에 관한 연구 : GoogleDocs 사용 경험을 중심으로 (A Study on Project Performance in Cloud Computing : Focus on User Experience of GoogleDocs)

  • 우혁준;심정현;이정훈
    • 한국전자거래학회지
    • /
    • 제16권1호
    • /
    • pp.71-100
    • /
    • 2011
  • IT 기술의 발전으로 시간적, 물리적 제약을 넘은 미래 인터넷 기술에 대한 사용자들의 기대가 커지고 있다. 이러한 요구를 충족시키기 위해 최근 새로운 개념으로 주목 받고 있는 것이 클라우드 컴퓨팅이다. 그러나 이러한 긍정적인 전망에도 불구하고 클라우드 컴퓨팅의 도입은 활발히 이루어지고 있지 않고 있는 실정이다. 따라서 본 연구에서는 클라우드 컴퓨팅 환경의 특성이 프로젝트 수행성과에 어떠한 영향을 미치는가에 대하여 살펴보았다. 본 연구는 기술적 도구로써 클라우드 컴퓨팅을 과업과 기술의 적합성 모형에 적용하여 클라우드 컴퓨팅 환경에서 개인이 프로젝트를 수행할 시에 나타나는 성과에 대하여 실증적인 연구를 하였다. 대학교 및 대학원에서 팀 단위의 프로젝트를 수행할 때, 클라우드 컴퓨팅의 가장 널리 보급된 형태인 GoogleDocs 및 웹하드에 대한 사용경험이 있는 응답자를 대상으로 설문을 수행하였다. 본 연구에서는 클라우드 컴퓨팅 환경에서 프로젝트를 수행한다는 행위에 중점을 두어, 접근성과 신뢰성을 적합성을 파악하기 위한 1차 요인으로 정의하여 프로젝트의 상호의존성과 개인의 특성이 적합성 및 활용을 통하여 성과에 어떤 영향을 미치는지를 분석하였다. 연구결과, 클라우드 컴퓨팅 환경은 팀 단위의 프로젝트 수행에 있어 적합한 도구라는 사실을 규명하였다. 본 연구는 초기단계의 클라우드 컴퓨팅에 있어 개인이 지각하는 적합성 및 성과를 규명함으로써, 협업에서의 클라우드 컴퓨팅의 긍정적인 영향에 대한 근거를 제시한다.

A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions

  • Liu, Yuhong;Sun, Yan Lindsay;Ryoo, Jungwoo;Rizvi, Syed;Vasilakos, Athanasios V.
    • Journal of Computing Science and Engineering
    • /
    • 제9권3호
    • /
    • pp.119-133
    • /
    • 2015
  • While cloud computing is gaining popularity, diverse security and privacy issues are emerging that hinder the rapid adoption of this new computing paradigm. And the development of defensive solutions is lagging behind. To ensure a secure and trustworthy cloud environment it is essential to identify the limitations of existing solutions and envision directions for future research. In this paper, we have surveyed critical security and privacy challenges in cloud computing, categorized diverse existing solutions, compared their strengths and limitations, and envisioned future research directions.

Dynamic Task Scheduling Via Policy Iteration Scheduling Approach for Cloud Computing

  • Hu, Bin;Xie, Ning;Zhao, Tingting;Zhang, Xiaotong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권3호
    • /
    • pp.1265-1278
    • /
    • 2017
  • Dynamic task scheduling is one of the most popular research topics in the cloud computing field. The cloud scheduler dynamically provides VM resources to variable cloud tasks with different scheduling strategies in cloud computing. In this study, we utilized a valid model to describe the dynamic changes of both computing facilities (such as hardware updating) and request task queuing. We built a novel approach called Policy Iteration Scheduling (PIS) to globally optimize the independent task scheduling scheme and minimize the total execution time of priority tasks. We performed experiments with randomly generated cloud task sets and varied the performance of VM resources using Poisson distributions. The results show that PIS outperforms other popular schedulers in a typical cloud computing environment.

Ubiquitous Computing을 위한 CRS와 DOS 기반의 Context-Aware System Architecture (CRS and DOS based Context-Aware System architecture for Ubiquitous Computing)

  • 두경민;김순국;이강환
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2007년도 추계종합학술대회
    • /
    • pp.501-505
    • /
    • 2007
  • 현재 기술 동향에 따라, 언제 어디서나 통신 및 컴퓨팅이 가능한 유비쿼터스 컴퓨팅 시스템(Ubiquitous Computing System)을 위해 사용자 및 주변 환경의 상황을 인식하는 기술(Context-Aware Computing System)이 필수적인 요소로 부각되고 있다. 하지만, Context-Aware Computing System을 구현하기 위해서 사용자 및 주변 환경으로부터 입력되는 불확실하거나 모호한 상황정보에 대한 표현과 추론에 대한 연구는 부족한 실정이다. 이를 해결하기 위해 Rule-based System을 기반으로 CRS와 DOS의 개념을 도입하여 상황인식 기술을 SoC로 구현할 수 있도록 새로운 Architecture를 제안한다. 마지막으로는 CRS와 DOS가 Network Topolgy에 적용된 RODMRP(Resilient Ontology-based Dynamic Multicast Routing Protocol)의 예를 통해 그 효용성을 입증하고, Ubiquitous Computing System에서 활용 가능한 방법 등을 제시한다.

  • PDF