• Title/Summary/Keyword: Data Sharing System

Search Result 1,106, Processing Time 0.029 seconds

DEVS 형식론을 이용한 다중프로세서 운영체제의 모델링 및 성능평가

  • 홍준성
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1994.10a
    • /
    • pp.32-32
    • /
    • 1994
  • In this example, a message passing based multicomputer system with general interdonnedtion network is considered. After multicomputer systems are developed with morm-hole routing network, topologies of interconecting network are not major considertion for process management and resource sharing. Tehre is an independeent operating system kernel oneach node. It communicates with other kernels using message passingmechanism. Based on this architecture, the problem is how mech does performance degradation will occur in the case of processor sharing on multicomputer systems. Processor sharing between application programs is veryimprotant decision on system performance. In almost cases, application programs running on massively parallel computer systems are not so much user-interactive. Thus, the main performance index is system throughput. Each application program has various communication patterns. and the sharing of processors causes serious performance degradation in hte worst case such that one processor is shared by two processes and another processes are waiting the messages from those processes. As a result, considering this problem is improtant since it gives the reason whether the system allows processor sharingor not. Input data has many parameters in this simulation . It contains the number of threads per task , communication patterns between threads, data generation and also defects in random inupt data. Many parallel aplication programs has its specific communication patterns, and there are computation and communication phases. Therefore, this phase informatin cannot be obtained random input data. If we get trace data from some real applications. we can simulate the problem more realistic . On the other hand, simualtion results will be waseteful unless sufficient trace data with varisous communication patterns is gathered. In this project , random input data are used for simulation . Only controllable data are the number of threads of each task and mapping strategy. First, each task runs independently. After that , each task shres one and more processors with other tasks. As more processors are shared , there will be performance degradation . Form this degradation rate , we can know the overhead of processor sharing . Process scheduling policy can affects the results of simulation . For process scheduling, priority queue and FIFO queue are implemented to support round-robin scheduling and priority scheduling.

  • PDF

Data Model Study for National Research Data Commons Service (국가연구데이터커먼즈 서비스를 위한 데이터모델 연구)

  • Cho, Minhee;Lee, Mikyoung;Song, Sa-kwang;Yim, Hyung-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.436-438
    • /
    • 2022
  • National Research Data Commons aims to build a system that can be used jointly by arranging analysis resources such as computing infrastructure, software, toolkit, API, and services used for data analysis together with research data to maximize the use of research data. do. The sharing and utilization system for publications and research data in the R&D process is well known. However, the environment in which data and tightly coupled software and computing infrastructure can be shared and utilized is insignificant and there is no management system. In this study, a data model is designed to systematically manage information on digital research resources required in the data-oriented R&D research process. This will be used to register and manage digital research resource information in the National Research Data Commons Service.

  • PDF

A Study on the Construction of Moving Route Information Sharing System of COVID-19 Confirmed Cases

  • Kim, Byungkyu;You, Beom-Jong;Shim, Hyoung-Seop
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.155-163
    • /
    • 2020
  • This study developed a system that can collect, manage, and utilize the travel routes of individuals who tested positive for coronavirus disease 2019 (COVID-19) based on the data standardization and quality management principles and presented the analysis data collected from the existing system. Unlike many other countries in the world, Korea demonstrated a rapid response by conducting epidemiological investigations. Further, the local governments have actively shared the travel routes of individuals who tested positive for COVID-19 to facilitate proactive prevention of the infectious disease per the Infectious Disease Control and Prevention Law. However, currently, there is no standard protocol for the local governments to share the information, thus complicating the process of sharing, managing, and utilizing the collected data. Therefore, this study developed a system that can facilitate sharing of the travel routes of individuals who tested positive for COVID-19 by establishing database construction procedures and using the travel route of COVID-19 patients as per the Disaster & Safety Information Sharing Platform and developing a data processing guideline, a data entry system with default templates, and Open API. Although this sharing system was designed to communicate the travel routes of COVID-19 patients, it can also be utilized in case of other infectious diseases. Therefore, it can be used as a response strategy for future outbreaks of infectious diseases.

A Study on Research Data Management Methods for Government-funded Research Institutes in the Field of Science and Technology (과학기술분야 정부출연연구기관 연구데이터 관리 방안 연구)

  • Na-eun Han;Jung-Ho Um;Hyung-Jun Yim
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.58 no.2
    • /
    • pp.151-175
    • /
    • 2024
  • This study analyzes the current status of research data management at NST-affiliated government-funded research institutes for the purpose of promoting the sharing and use of research data, and based on this, suggests methods for establishing a research data sharing and management system. The survey on the status of research data management was conducted twice in 2022 and 2023 for a total of 20 research institutes. In addition, difficulties and areas that need to be improved in the management and sharing of research data were identified, and based on this, methods for establishing a research data sharing and management system were proposed by dividing them into policy aspects, system aspects, and linkage system construction aspects. In order to establish a research data sharing system, it would be desirable to prepare a policy basis and present contents such as the definition of research data, scope of application, contents of management, utilization method, and leading institutes. In addition, for systematic and unified research data management, it would be recommended that each institute will establish and manage a repository and management system. By linking this with DataON, the national research data platform, and providing one-stop services, the accessibility and usability of data will be improved.

A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud

  • Hong, Hanshu;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2394-2406
    • /
    • 2016
  • ABE has become an effective tool for data protection in cloud computing. However, since users possessing the same attributes share the same private keys, there exist some malicious users exposing their private keys deliberately for illegal data sharing without being detected, which will threaten the security of the cloud system. Such issues remain in many current ABE schemes since the private keys are rarely associated with any user specific identifiers. In order to achieve user accountability as well as provide key exposure protection, in this paper, we propose a key-insulated ciphertext policy attribute based encryption with key exposure accountability (KI-CPABE-KEA). In our scheme, data receiver can decrypt the ciphertext if the attributes he owns match with the self-centric policy which is set by the data owner. Besides, a unique identifier is embedded into each user's private key. If a malicious user exposes his private key for illegal data sharing, his identity can be exactly pinpointed by system manager. The key-insulation mechanism guarantees forward and backward security when key exposure happens as well as provides efficient key updating for users in the cloud system. The higher efficiency with proved security make our KI-CPABE-KEA more appropriate for secure data sharing in cloud computing.

The Structural Relationships between the Antecedents of Knowledge Sharing and User Performance in Knowledge Management systems (지식관리시스템에서의 지식공유에 대한 영향요인과 성과간의 구조적 관계에 관한 연구)

  • Shin, Seon-Jin;Kong, Hee-Kyoung;Koh, Joon
    • Knowledge Management Research
    • /
    • v.9 no.2
    • /
    • pp.87-107
    • /
    • 2008
  • The knowledge society has come to where the knowledge is the source of wealth contrary to the traditional era that labor and capital were the source of wealth. Thus, corporate is accelerating to introduce the knowledge management and to establish the knowledge management system (KMS) in order to effectively manage the knowledge that can be the source of their competitiveness. The purpose of this paper is to identify the factors which affect knowledge sharing and to prove empirically their relationships with the KMS performance. A survey was conducted and data were collected from 220 respondents of 19 organizations which have adopted KMS. Research model and related hypotheses were tested using PLS Graph 3.0. As a result of data analysis, seven hypotheses out of eleven hypotheses were supported. In particular, knowledge sharing is significantly influenced by those knowledge sharing factors such as openness, trust, training, reward system, perceived usefulness, and communication channel. Also, individual impact is significantly affected by knowledge sharing. This study is expected to provide a sound basis for understanding the importance of knowledge sharing to gain organizational as well as individual competitiveness and exploring ways to effectively share knowledge through enhancing the use of KMS in organizations.

  • PDF

Analysis of Future Spectrum Sharing Ecosystem Based on Causal Map (인과지도에 기반한 미래 주파수공유 생태계 분석)

  • Song, Hee Seok;Kim, Taehan
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.4
    • /
    • pp.19-31
    • /
    • 2013
  • There is tremendous increasing demand on spectrum resource which is boosted by spread of cloud computing and M2M telecommunication as well as smart phone and tablet PC. Recently, spectrum sharing technology has drawn attention to the spectrum policy makers as a promising way to overcome limitation of scarce spectrum resource. To succeed in commercialization of spectrum sharing technology, it is necessary to prospect the future business ecosystem of spectrum sharing and develop appropriate policies and laws at the same time along with the advance of spectrum sharing technology. The purpose of this paper is to prospect future spectrum sharing ecosystem and analyze business ecosystem of spectrum sharing with casual loop map. With the causal map and system dynamics method, it is possible to analyze feedback loops which is not limited to linear thinking and build policies which optimize positive dynamics in business ecosystem of spectrum sharing.

Efficient Certificate-Based Proxy Re-encryption Scheme for Data Sharing in Public Clouds

  • Lu, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2703-2718
    • /
    • 2015
  • Nowadays, public cloud storage is gaining popularity and a growing number of users are beginning to use the public cloud storage for online data storing and sharing. However, how the encrypted data stored in public clouds can be effectively shared becomes a new challenge. Proxy re-encryption is a public-key primitive that can delegate the decryption right from one user to another. In a proxy re-encryption system, a semi-trusted proxy authorized by a data owner is allowed to transform an encrypted data under the data owner's public key into a re-encrypted data under an authorized recipient's public key without seeing the underlying plaintext. Hence, the paradigm of proxy re-encryption provides a promising solution to effectively share encrypted data. In this paper, we propose a new certificate-based proxy re-encryption scheme for encrypted data sharing in public clouds. In the random oracle model, we formally prove that the proposed scheme achieves chosen-ciphertext security. The simulation results show that it is more efficient than the previous certificate-based proxy re-encryption schemes.

Effects of Learning Expectation and Perceived Knowledge Sharing on User Satisfaction and IS Continuance (학습기대와 지식공유 지각이 사용자 만족과 지속사용에 미치는 영향)

  • Kim, In Chan;Baek, Seung Nyoung
    • The Journal of Information Systems
    • /
    • v.28 no.4
    • /
    • pp.377-401
    • /
    • 2019
  • Purpose The purpose of this study is to investigate the effects of learning expectation and perceived knowledge sharing on user satisfaction and IS continuance in the Korean Army which is currently using the Regiments' Information System to help their Integrated Administration Management. Based on both the Information System(IS) Continuance Model and IS Success Model, this study also examine the role of system quality on user satisfaction. We develop a research model(structural equation model) and its hypotheses that learning expectation, perceived knowledge sharing, and system quality increase users' satisfaction, which leads to IS continuance. The effect of learning expectation on perceived knowledge sharing is also hypothesized. Design/methodology/approach Online Survey using e-mails was administered to test our research model and associated hypotheses. Among the 360 e-mail letters including our survey questionnaire, 285 responses were collected via e-mails. Meaningful 225 cases were analyzed for our study. SPSS Statistics 24.0 and SmartPLS 3.0 were used to analyze both measuremant test and hyotheses test by using the data set. Findings Survey results show that learning expectation(confirmation variable), learning expectation, perceived knowledge sharing(a perceived usefulness variable), and system quality(a system characteristic) each increases user satisfaction, which leads to IS continuance, under the control of the effect of habit to use information systems. Learning expectation also has a positive influence on perceived knowledge sharing. Theoretical and practical implications are presented.

Evaluating the Performance of Revenue Sharing Contract in Three Stage Supply Chain System

  • Chungsuk RYU
    • Journal of Distribution Science
    • /
    • v.22 no.1
    • /
    • pp.95-103
    • /
    • 2024
  • Purpose: Focusing on the complex supply chain operations beyond the simple dyadic relationship, this study evaluates the performance of the revenue sharing contract in three stage supply chain system. Research design, data, and methodology: The optimization model is developed to describe the supply chain system where one manufacturer, one wholesaler, and one retailer exist and pursue the maximum level of their own profits. In the numerical examples of the proposed supply chain model, two types of the revenue sharing contract, pairwise and spanning methods, are tested and their performances are compared with the traditional system. Results: The numerical analysis reveals that both types of the revenue sharing contract outperform the traditional system. All supply chain members can achieve the improved profits only when they determine the proper combination of revenue share ratios and price discount rates. Conclusions: This study finds out that both pairwise and spanning revenue sharing contracts can make the positive outcome that is acceptable to all members in three stage supply chain system. When the proper contract content is agreed among the supply chain members, the revenue sharing contract has the potential to be the practically feasible collaboration program for the multiple stage supply chain system.