• Title/Summary/Keyword: Digital Computing Environment

Search Result 285, Processing Time 0.028 seconds

Group key management protocol adopt to cloud computing environment (클라우드 컴퓨팅 환경에 적합한 그룹 키 관리 프로토콜)

  • Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.12 no.3
    • /
    • pp.237-242
    • /
    • 2014
  • Recently, wind energy is expanding to combination of computing to forecast of wind power generation as well as intelligent of wind powerturbine. Wind power is rise and fall depending on weather conditions and difficult to predict the output for efficient power production. Wind power is need to reliably linked technology in order to efficient power generation. In this paper, distributed power generation forecasts to enhance the predicted and actual power generation in order to minimize the difference between the power of distributed power short-term prediction model is designed. The proposed model for prediction of short-term combining the physical models and statistical models were produced in a physical model of the predicted value predicted by the lattice points within the branch prediction to extract the value of a physical model by applying the estimated value of a statistical model for estimating power generation final gas phase produces a predicted value. Also, the proposed model in real-time National Weather Service forecast for medium-term and real-time observations used as input data to perform the short-term prediction models.

A Case Study of the Economic Performance Measurement of Information System Integration in Public Sector (공공부문 정보시스템 통합의 경제적 성과 측정 사례연구)

  • Jung, Hae-Yong;Ra, Jong-Hei
    • Journal of Digital Convergence
    • /
    • v.8 no.4
    • /
    • pp.185-204
    • /
    • 2010
  • This case study quantifies the savings that can be realized through integration in National Computing & Information Agency (NCIA) of the Korea Government. It is based on the process of the NCIA development project that consolidating and integrating distributed 24 agencies. And it used the widely accepted Gartner TCO (Total Cost of Ownership) Solution and applies that methodology consistently before and after integration. Specific measurement items for examining the information system integration saving cost are developed pilot test for 2 agencies through compare TCO before integration and TCO after integration. The results of measuring on information system integration in NCIA are showed lots of economic cost reduction in TCO by integrating and consolidating each computing environment in agency. Especially in detail, NCIA realized the most savings in IT Capital Cost including development of hardware, software and recovery system. Also IT Support Cost and IT Administration Cost examined more savings than before IT integration.

  • PDF

A Location Recognition and Notification Method of Attacker in Wireless Network Environment (모바일 환경에서의 공격자 위치 특정 및 알람 기법)

  • Bong, Jin-Sook;Park, Sang-Jin
    • Journal of Digital Convergence
    • /
    • v.15 no.7
    • /
    • pp.201-211
    • /
    • 2017
  • Wireless network using dynamic IP and mobile IP technology provides the user with convenience of access and movement. However, this causes the attacker who disguises normal user(pretending to be a regular user) to have more opportunity in regard to access and acquisition of information. This paper help the network administrator and the service provider quickly to recognize the attacker's intention to access network and service. Therefore network administrator and service provider can specify and respond the location of the attacker appropriately. To achieve above, we define an entity (W_L_M) that manages user information of WiFi and LTE network, and propose messages and procedures for attacker's location identification and alarm. The performance evaluation of this paper is based on qualitative analysis. By using the proposed method, some cost (message creation, processing and transmission) occurred but it was analyzed to be less than the total network operation cost. The proposal of this paper is a management method that utilizes existing network information and structure. This method can be used as a reference material to enhance security.

Improving the Job Success Rate through Analysis of User Logs in HPC (HPC 환경에서 사용자 로그 분석을 통한 작업 성공률 개선)

  • Yoon, JunWeon;Hong, TaeYoung;Kong, Ki-Sik;Park, ChanYeol
    • Journal of Digital Contents Society
    • /
    • v.16 no.5
    • /
    • pp.691-697
    • /
    • 2015
  • Supercomputers are used for many different areas including new product design of industries as well as state-of-the-art science and technology for large amount of computational needs. Tachyon is a 4th supercomputer built at KISTI that is a high-performance parallel computing system with 3,200 computing nodes and infrastructures. This system is currently about 10,000 users and over 170 organizations are used, the number of jobs they are performing work in batch type form through a scheduler. Also, this system logs lots of job scripts, execution environment, library, job status from the job submit to end. In this paper, we analyzed batch jobs information from Sun Grid Engine, that use as a scheduler in Tachyon system, and job executed information in Tachyon System. In particular, we distinguished the fail jobs from the all tasks that users perform and we analyzed the cause of failure. Among them, we can extracted some of jobs that can be regarded as normal jobs through the improvement in those works logged as all of fail jobs.

Design and Implementation of Incremental Learning Technology for Big Data Mining

  • Min, Byung-Won;Oh, Yong-Sun
    • International Journal of Contents
    • /
    • v.15 no.3
    • /
    • pp.32-38
    • /
    • 2019
  • We usually suffer from difficulties in treating or managing Big Data generated from various digital media and/or sensors using traditional mining techniques. Additionally, there are many problems relative to the lack of memory and the burden of the learning curve, etc. in an increasing capacity of large volumes of text when new data are continuously accumulated because we ineffectively analyze total data including data previously analyzed and collected. In this paper, we propose a general-purpose classifier and its structure to solve these problems. We depart from the current feature-reduction methods and introduce a new scheme that only adopts changed elements when new features are partially accumulated in this free-style learning environment. The incremental learning module built from a gradually progressive formation learns only changed parts of data without any re-processing of current accumulations while traditional methods re-learn total data for every adding or changing of data. Additionally, users can freely merge new data with previous data throughout the resource management procedure whenever re-learning is needed. At the end of this paper, we confirm a good performance of this method in data processing based on the Big Data environment throughout an analysis because of its learning efficiency. Also, comparing this algorithm with those of NB and SVM, we can achieve an accuracy of approximately 95% in all three models. We expect that our method will be a viable substitute for high performance and accuracy relative to large computing systems for Big Data analysis using a PC cluster environment.

HaptiSole: Wearable Haptic System in Vibrotactile Guidance Shoes for Visually Impaired Wayfinding

  • Slim Kammoun;Rahma Bouaziz;Faisal Saeed;Sultan Noman Qasem;Tawfik Al-Hadhrami
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3064-3082
    • /
    • 2023
  • During the last decade, several Electronic Orientation Aids devices have been proposed to solve the autonomy problems of visually impaired people. When hearing is considered the primary sense for Visually Impaired people (VI) and it is generally loaded with the environment, the use of tactile sense can be considered a solution to transmit directional information. This paper presents a new wearable haptic system based on four motors implemented in shoes, while six directions can be played. This study aims to introduce an interface design and investigate an appropriate means of spatial information delivery through haptic sense. The first experiment of the proposed system was performed with 15 users in an indoor environment. The results showed that the users were able to recognize, with high accuracy, the directions displayed on their feet. The second experiment was conducted in an outdoor environment with five blindfolded users who were guided along 120 meters. The users, guided only by the haptic system, successfully reached their destinations. The potential of tactile-foot stimulation to help VI understand Electronic Orientation Aids (EOA) instructions was discussed, and future challenges were defined.

Represented by the Color Image Emotion Emotional Attributes of Size, Quantification Algorithm (이미지의 색채 감성속성을 이용한 대표감성크기 정량화 알고리즘)

  • Lee, Yean-Ran
    • Cartoon and Animation Studies
    • /
    • s.39
    • /
    • pp.393-412
    • /
    • 2015
  • See and feel the emotion recognition is the image of a person variously changed according to the environment, personal disposition. Thus, the image recognition has been focused on the emotional sensibilities computer you want to control the number studies. However, existing emotional computing model is numbered and the objective is clearly insufficient measurement conditions. Thus, through quantifiable image Emotion Recognition and emotion computing, is a study of the situation requires an objective assessment scheme. In this paper, the sensitivity was represented by numbered sizes quantified according to the image recognition calculation emotion. So apply the principal attributes of the color image emotion recognition as a configuration parameter. In addition, in calculating the color sensitivity by applying a digital computing focused research. Image color emotion computing research approach is the color of emotion attribute, brightness, and saturation reflects the weighted according to importance to the emotional scores. And free-degree by applying the sensitivity point to the image sensitivity formula (X), the tone (Y-axis) is calculated as a number system. There pleasure degree (X-axis), the tension and position the position of the image point that the sensitivity of the emotional coordinate crossing (Y-axis). Image color coordinates by applying the core emotional effect of Russell (Core Affect) is based on the 16 main representatives emotion. Thus, the image recognition sensitivity and compares the number size. Depending on the magnitude of the sensitivity scores demonstrate this sensitivity must change. Compare the way the images are divided up the top five of emotion recognition emotion emotions associated with 16 representatives, and representatives analyzed the concentrated emotion sizes. Future studies are needed emotional computing method of calculation to be more similar sensibility and human emotion recognition.

A Study on Secure Data Access Control in Mobile Cloud Environment (모바일 클라우드 환경에서 안전한 데이터 접근 제어에 관한 연구)

  • Kim, Si-Jung;Yeo, Sang-Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.317-322
    • /
    • 2013
  • Mobile cloud environment is recently becoming popular due to Internet access through various environments. Driven by computer performance improvement and service development, the demand for mobile cloud is increasing and accordingly the damage is on the rise. Therefore, it needs to conduct a study on problems of security necessary in large database that occurs in mobile cloud services. Although various security solutions limiting database access, security strategies about new user environments should be analyzed. This study analyzes weakness of safe data access through database management in mobile cloud environment and examines security requirements for safe data management. In addition, this study looks into threatening factors of security in cloud services and then draws security requirements about safer access control. A study on system application and evaluation of security requirements about access control is required.

Data Cleaning System using XMDR-DAI in Cloud (클라우드 환경에서 XMDR-DAI를 이용한 데이터 정제 시스템)

  • Moon, Seok-Jae;Jeong, Kye-Dong;Lee, Jong-Yong;Cho, Young-Keun
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.263-270
    • /
    • 2014
  • In cloud environment, business intelligence data warehouse is used for decision making and enterprise policy. But if new system is added in cloud environment, much cost and time is needed due to heterogenous characteristics in data integration. This paper suggests a data cleaning system for business intelligence in cloud environment. The proposed system minimizes the effect of local system when it integrates distributed system using XMDR-DAI. And this system provides standardized information to generate information of data warehouse in real time. Also the proposed system saves cost and time by integrating the data without a change of existed system. And it can improve quality of information by generating coherent information through data extraction and cleaning work in real time.

Design and Implementation of a Retrieval Server for Virtual Documents in the MIRAGE-III Digital Library (MIRAGE-III 디지털도서관에서 가상문서 검색 서버의 설계 및 구현)

  • Lee, Yong-Bae;Maeng, Sung-Hyon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.219-230
    • /
    • 2002
  • One of the most important functions digital libraries need to offer is to help users find necessary information in a distributed environment in the most efficient and effective manner. In order to meet the goal, it is desirable to link scattered pieces of information and present them as a logically coherent whole when the user wants it, so that he or she doesn't need to know their physical location. The virtual document is an integrated document that the total or part of the physical documents stored in a specific repository are linked dynamically. Our MIRAGE-III digital library system provides a content-based retrieval of physical documents and the virtual documents in XML. This system provides a retrieval of partial documents, attributes and hierarchical structures and linked-documents based in structured documents like XML or SGML. In this paper we describe a methodology of design and implementation of the query processor and retrieval server in the MIRAGE-III digital library system.