• Title/Summary/Keyword: Computing technology

Search Result 4,154, Processing Time 0.032 seconds

Self-Configuring Method for Autonomic Grid Computing (자율 그리드 컴퓨팅을 위한 자기구성 기법)

  • Kim Young-Gyun;Cho Kum Won;Na Jeong-su;Oh Gil-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.520-522
    • /
    • 2005
  • 본 논문에서는 기존의 그리드 컴퓨팅(Grid Computing)에 자율 컴퓨팅(Autonomic Computing)기술을 적용한 자율 그리드 컴퓨팅(Autonomic Grid Computing)에 관하여 연구하였다. 자율 그리드 컴퓨팅 기술 중 자기 구성(Self-Configuration)을 기존의 그리드 컴퓨팅에 적용하는 기법을 새롭게 제안하였다. 장시간 수행 되어야 하는 과학기술 분야의 연산 작업은 연산시간을 단축하기 위해 새로운 노드의 추가와 같은 시스템의 환경 변화를 자동 감지하여 수행중인 연산 작업에 새로운 노드를 추가할 필요가 있다. 제안한 방법은 새롭게 추가된 노드를 연산 작업에 포함하도록 시스템의 변화를 스스로 구성한다. 기존의 그리드 컴퓨팅 보다 시스템의 변화에 보다 잘 적응한다.

  • PDF

Managing Sensor Data in Ambient Assisted Living

  • Nugent, C.D.;Galway, L.;Chen, L.;Donnelly, M.P.;Mcclean, S.I.;Zhang, S.;Scotney, B.W.;Parr, G.
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.3
    • /
    • pp.237-245
    • /
    • 2011
  • The use of technology within the home has gained wide spread acceptance as one possible approach to be used in addressing the challenges of an ageing society. A number of rudimentary assistive solutions are now being deployed in real settings but with the introduction of these technology-orientated services come a number of challenges, which to date are still largely unsolved. At a fundamental level, the management and processing of the large quantities of data generated from multiple sensors is recognised as one of the most significant challenges. This paper aims to present an overview of the types of sensor technologies used within Ambient Assisted Living. Subsequently, through presentation of a series of case studies, the paper will demonstrate how the practical integration of multiple sources of sensor data can be used to improve the overall concept and applications of Ambient Assisted Living.

uPC player : An OS Virtualization-based Technique to Support Stateless Computing Execution Environment on Windows (uPC player : 윈도우 운영체제에서의 OS가상화 기반 무상태 컴퓨팅 실행환경 지원 기술)

  • Sung, Baek-Jae;Park, Chan-Ik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.1
    • /
    • pp.125-129
    • /
    • 2010
  • Stateless computing supports a mobility of computing environment easily. It is becoming a major technology for securing personal user's information on shared computing environment. With the advance of virtualization technology and cloud computing, stateless computing is an essential part of personal computing environment connectivity (user's setting and data is stored in remote server or some storage, and it can be restored at any computing environment) In this paper, we propose uPC player that supports stateless computing execution environment on Windows. uPC player provides Windows operating system to user by using an uPC OS virtualization module. In this paper, we leverage how uPC player is designed and implemented for supporting a stateless computing execution environment. uPC player provides a desktop switch between host-system execution environment and uPC virtual execution environment. And it needs just one second for loading uPC virtual execution environment by using OS virtualization-based technique.

Cloud Computing Acceptance at Individual Level Based on Extended UTAUT (확장된 UTAUT 모형에 기반한 개인차원에서의 클라우드 컴퓨팅 수용)

  • Jung, Chul Ho;Namn, Su Hyeon
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.287-294
    • /
    • 2014
  • Cloud computing is a new method of computing and managing organizational information technology resources strategically. From the user perspective, it involves computing environment for accessing applications remotely, storing data, and supporting cooperative works. For the cloud computing to be effective in an organization, it should be accepted by individual users. In this paper we propose a research model, extending and modifying UTAUT model. We also test the validity of the model using the questionnaire from a sample of cloud computing services users.

The Effect of Perceived Risk and Trust on Users' Acceptance of Cloud Computing : Mobile Cloud Computing (인지된 위험과 신뢰가 Cloud Computing 사용의도에 미치는 영향 : 모바일 Cloud Computing을 중심으로)

  • Kim, Jun-Woo;Kim, Yong-Gu
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.35 no.3
    • /
    • pp.70-76
    • /
    • 2012
  • This research tested how the perceived risk and the trust affect the usage intention of the cloud computing. To this end, this research setups a research model and tests it with the statistic tools. In order to build the model, TAM (Technology Acceptance Model) and UTAUT (Unified Theory of Acceptance and Use of Technology) were employed and, the factors such as the perceived risk, the trust and the intention of the cloud computing use were derived. This research finds that the perceived risk does not affect the intention of usage. Also the perceived risk has the negative effect for the trust. Thus this research has the following suggestions.

Systematic Literature Review on Cloud Adoption

  • Bagiwa, Idris Lawal;Ghani, Imran;Younas, Muhammad;Bello, Mannir
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.1-22
    • /
    • 2016
  • While many organizations believe that cloud computing has the potential to reduce operational cost by abstracting capital assets like data storage center and processing systems into a readily on demand available and affordable operating expenses, still many of these organizations are not aware of the factors determining the performance of cloud computing technology. This paper provides a systematic literature review focusing on the factors determining the performance of cloud computing. In trying to come up with this review, the following sources were searched for relevant articles: ScienceDirect, Scientific.Net, ACMDigital Library, IEEE Xplore, Springer, World Scientific Journal, Wiley Online Library, Academic Search Premier (via EBSCOHost) and EdITLib (Education & Information Technology Digital Library). In first search strategy, approximately 100 keywords related to the research domain like; "Cloud Computing" and "Cloud Services" were used. In second search strategy, 65 keywords more related to the research domain were selected. In the third search strategy, the primary materials were identified and classified according to the paper types (Journal or Conference), year of publication and so on. Based on this study, twenty (20) factors were found that determine the performance of cloud computing. The IT organization needs to consider these twenty (20) factors in order to adopt cloud computing.

A Study on effective risk analysis and evaluation method of cloud computing system environment (클라우드컴퓨팅 시스템 환경의 효과적 위험분석평가 방법에 관한 연구)

  • Lee, Junglimg;Chang, Hangbae
    • Journal of Platform Technology
    • /
    • v.9 no.2
    • /
    • pp.10-25
    • /
    • 2021
  • Although many studies have been conducted on risk analysis and evaluation in the on-premises environment in information security, studies on effective methodologies of risk analysis and evaluation for cloud computing systems are lacking. In 2015, the Cloud Computing Development Act was enacted, which served as an opportunity to promote the introduction of cloud computing. However, due to the increase in security incidents in the cloud computing system, activation is insufficient. In addition, the cloud computing system is not being actively introduced because of the difficulty in understanding the cloud computing system technology of the person in charge who intends to introduce the cloud computing system. In this regard, this study presented an effective risk analysis and evaluation method by examining the characteristics, concepts, and models of cloud computing systems and analyzing how these characteristics affect risk analysis and evaluation.

EHMM-CT: An Online Method for Failure Prediction in Cloud Computing Systems

  • Zheng, Weiwei;Wang, Zhili;Huang, Haoqiu;Meng, Luoming;Qiu, Xuesong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4087-4107
    • /
    • 2016
  • The current cloud computing paradigm is still vulnerable to a significant number of system failures. The increasing demand for fault tolerance and resilience in a cost-effective and device-independent manner is a primary reason for creating an effective means to address system dependability and availability concerns. This paper focuses on online failure prediction for cloud computing systems using system runtime data, which is different from traditional tolerance techniques that require an in-depth knowledge of underlying mechanisms. A 'failure prediction' approach, based on Cloud Theory (CT) and the Hidden Markov Model (HMM), is proposed that extends the HMM by training with CT. In the approach, the parameter ω is defined as the correlations between various indices and failures, taking into account multiple runtime indices in cloud computing systems. Furthermore, the approach uses multiple dimensions to describe failure prediction in detail by extending parameters of the HMM. The likelihood and membership degree computing algorithms in the CT are used, instead of traditional algorithms in HMM, to reduce computing overhead in the model training phase. Finally, the results from simulations show that the proposed approach provides very accurate results at low computational cost. It can obtain an optimal tradeoff between 'failure prediction' performance and computing overhead.

Deep Web and MapReduce

  • Tao, Yufei
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.3
    • /
    • pp.147-158
    • /
    • 2013
  • This invited paper introduces results on Web science and technology obtained during work with the Korea Advanced Institute of Science and Technology. In the first part, we discuss algorithms for exploring the deep Web, which refers to the collection of Web pages that cannot be reached by conventional Web crawlers. In the second part, we discuss sorting algorithms on the MapReduce system, which has become a dominant paradigm for massive parallel computing.

Cloud computing Issues and Security measure (클라우드 컴퓨팅 보안 대책 연구)

  • Lee, Sang Ho
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.31-35
    • /
    • 2015
  • Cloud computing is internet-based computing technology. This is a form for exchanging service focused on the Internet. Because Cost is saved and use is easy there's a tendency that many companies are using. Cloud is in the form of a public cloud and private cloud and hybrid cloud. The service model is SaaS, PaaS, IaaS. Cloud computing use is simple but it has a security vulnerability. In particular, there is a vulnerability in virtualization and centralized information. In order to overcome this new security technology is to be developed. In particular, network security technology and authentication technology should be developed. Another way to overcome security responsibilities must be clearly and policies should be unified.

  • PDF