• 제목/요약/키워드: End-user computing

Search Result 132, Processing Time 0.024 seconds

Establishment and service of user analysis environment related to computational science and engineering simulation platform

  • Kwon, Yejin;Jeon, Inho;On, Noori;Seo, Jerry H.;Lee, Jongsuk R.
    • Journal of Internet Computing and Services
    • /
    • v.21 no.6
    • /
    • pp.123-132
    • /
    • 2020
  • The EDucation-research Integration through Simulation On the Net (EDISON) platform, which is a web-based platform that provides computational science and engineering simulation execution environments, can offer various analysis environments to students, general users, as well as computational science and engineering researchers. To expand the user base of the simulation environment services, the EDISON platform holds a challenge every year and attempts to increase the competitiveness and excellence of the platform by analyzing the user requirements of the various simulation environment offered. The challenge platform system in the field of computational science and engineering is provided to users in relation to the simulation service used in the existing EDISON platform. Previously, EDISON challenge servicesoperated independently from simulation services, and hence, services such as end-user review and intermediate simulation results could not be linked. To meet these user requirements, the currently in-service challenge platform for computational science and engineering is linked to the existing computational science and engineering service. In addition, it was possible to increase the efficiency of service resources by providing limited services through various analyses of all users participating in the challenge. In this study, by analyzing the simulation and usage environments of users, we provide an improved challenge platform; we also analyze ways to improve the simulation execution environment.

Design and Implementation of An User-Centered Training System for Efficient IT Service Management based on ITIL (ITIL 기반의 효율적 IT 서비스 관리를 위한 사용자 중심 교육 시스템 설계 및 구현)

  • Kim, Do Sung;Lee, Nam Yong
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.12
    • /
    • pp.651-659
    • /
    • 2017
  • IT(Information Technology) has focused on infrastructure-technologies in the past but now focuses on IT service. Many companies strive to save costs and improve IT services. For this reason, they strive to implement a good internalization of ITSM (IT Service Management) by developing ITSM systems based on ITIL (Information Technology Infrastructure Library) from the late 2000s. In particular, IT service operations are one of the structure elements of ITIL version 3 and are highly related to the internalization of ITSM. However, in spite-of-the successful implementation of ITSM, the efficiency of IT service management has not improved due to iterative issues. Therefore, this study developed a user-centered training system by defining the iterative issue guidelines and implementing a database. The implemented user-centered training system provided IT service users with regular training services to produce a good solution for iterative issues after connecting the operation part of the ITSM system. Based on the results of this study, we expect that the proposed ITSM system will contribute to efficiently managing IT services by improving the limitations of IT service operation in the ITSM system.

Economic Impact of HEMOS-Cloud Services for M&S Support (M&S 지원을 위한 HEMOS-Cloud 서비스의 경제적 효과)

  • Jung, Dae Yong;Seo, Dong Woo;Hwang, Jae Soon;Park, Sung Uk;Kim, Myung Il
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.10
    • /
    • pp.261-268
    • /
    • 2021
  • Cloud computing is a computing paradigm in which users can utilize computing resources in a pay-as-you-go manner. In a cloud system, resources can be dynamically scaled up and down to the user's on-demand so that the total cost of ownership can be reduced. The Modeling and Simulation (M&S) technology is a renowned simulation-based method to obtain engineering analysis and results through CAE software without actual experimental action. In general, M&S technology is utilized in Finite Element Analysis (FEA), Computational Fluid Dynamics (CFD), Multibody dynamics (MBD), and optimization fields. The work procedure through M&S is divided into pre-processing, analysis, and post-processing steps. The pre/post-processing are GPU-intensive job that consists of 3D modeling jobs via CAE software, whereas analysis is CPU or GPU intensive. Because a general-purpose desktop needs plenty of time to analyze complicated 3D models, CAE software requires a high-end CPU and GPU-based workstation that can work fluently. In other words, for executing M&S, it is absolutely required to utilize high-performance computing resources. To mitigate the cost issue from equipping such tremendous computing resources, we propose HEMOS-Cloud service, an integrated cloud and cluster computing environment. The HEMOS-Cloud service provides CAE software and computing resources to users who want to experience M&S in business sectors or academics. In this paper, the economic ripple effect of HEMOS-Cloud service was analyzed by using industry-related analysis. The estimated results of using the experts-guided coefficients are the production inducement effect of KRW 7.4 billion, the value-added effect of KRW 4.1 billion, and the employment-inducing effect of 50 persons per KRW 1 billion.

Improving the Key Search using Parallelism in RFID Privacy Protection

  • Shin, Myeong-Sook;Kim, Choong-Woon;Lee, Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.1
    • /
    • pp.19-24
    • /
    • 2007
  • Abstract. In the ubiquitous environment of the next generation, RFID is predicted to occupy an important technical location and also expected to apply to various fields. However, the properties of tags in itself which is the core of RFID have a dysfunction like an invasion of privacy for user. An existing cryptanalytic protection scheme of the information leakage have a difficult problem to apply to RFID tags for privacy protection. We applied Ohkubo et al.'s scheme to the protection of the tag's information efficiently in the RFID system environment using low-cost tags. But, this method has all informations of tagsto identify tag's ID and then performs the process of identification in sequence in the Back-end server. These processes have lots of computations so that it have problems about a scalability. In this paper, we are based on Ohkubo et al.'s scheme to solve problems, and then analyze the parallelism with the Hellman's tradeoff method, divide it into nodesin parallel. In this paper, we are based on Okubo et al.'s scheme to solve problems, and then analyze the parallelism with Hellman's tradeoff method, divide it into the ${\omega}$ node in parallel. as a result, we can reduce the computing complexity of key search to $O(\frac{m^{2/3}n^{2/3}}{\omega})$ seconds from O(mm) seconds. finally we show the results to be enhanced the scalability.

  • PDF

Educational Framework for Interactive Product Prototyping

  • Nam Tek-Jin
    • Archives of design research
    • /
    • v.19 no.3 s.65
    • /
    • pp.93-104
    • /
    • 2006
  • When the design profession started, design targets were mainly static hardware centered products. Due to the development of network and digital technologies, new products with dynamic and software-hardware hybrid interactive characteristics have become one of the main design targets. To accomplish the new projects, designers are required to learn new methods, tools and theories in addition to the traditional design expertise of visual language. One of the most important tools for the change is effective and rapid prototyping. There have been few researches on educational framework for interactive product or system prototyping to date. This paper presents a new model of educational contents and methods for interactive digital product prototyping, and it's application in a design curricula. The new course contents, integrated with related topics such as physical computing and tangible user interface, include microprocessor programming, digital analogue input and output, multimedia authoring and programming language, sensors, communication with other external devices, computer vision, and movement control using motors. The final project of the course was accomplished by integrating all the exercises. Our educational experience showed that design students with little engineering background could learn various interactive digital technologies and its' implementation method in one semester course. At the end of the course, most of the students were able to construct prototypes that illustrate interactive digital product concepts. It was found that training for logical and analytical thinking is necessary in design education. The paper highlights the emerging contents in design education to cope with the new design paradigm. It also suggests an alterative to reflect the new requirements focused on interactive product or system design projects. The tools and methods suggested can also be beneficial to students, educators, and designers working in digital industries.

  • PDF

Hand Gesture Interface Using Mobile Camera Devices (모바일 카메라 기기를 이용한 손 제스처 인터페이스)

  • Lee, Chan-Su;Chun, Sung-Yong;Sohn, Myoung-Gyu;Lee, Sang-Heon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.5
    • /
    • pp.621-625
    • /
    • 2010
  • This paper presents a hand motion tracking method for hand gesture interface using a camera in mobile devices such as a smart phone and PDA. When a camera moves according to the hand gesture of the user, global optical flows are generated. Therefore, robust hand movement estimation is possible by considering dominant optical flow based on histogram analysis of the motion direction. A continuous hand gesture is segmented into unit gestures by motion state estimation using motion phase, which is determined by velocity and acceleration of the estimated hand motion. Feature vectors are extracted during movement states and hand gestures are recognized at the end state of each gesture. Support vector machine (SVM), k-nearest neighborhood classifier, and normal Bayes classifier are used for classification. SVM shows 82% recognition rate for 14 hand gestures.

Efficient File System Level Encryption Mechanism Using HSM (HSM을 이용한 효율적인 파일시스템 암호화 메커니즘)

  • Kang, Cheol-Oh;Won, Jong-Jin;Park, Sung-Jin;Ryou, Jea-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.849-858
    • /
    • 2013
  • In today's mobile computing environment, there are many threats, such as device loss or theft, malware, to the sensitive information stored on end user device. To prevent disclosure of information, encryption and authentication method are properly adjusted to the device. In cryptographic file systems, CBC mode of operation has been commonly used. It requires an IV need not be secret, but must be unpredictable and protect integrity of the IV. In this paper, we propose file system-level encryption mechanism with HSM that satisfy the requirement of the IV and improve the performance. Moreover, Design and experimental results prove the efficiency of our proposed method.

Implementation of Mobile IPv6 Fast Authorization for Real-time Prepaid Service (실시간 선불 서비스를 위한 모바일 IPv6 권한검증 구현)

  • Kim Hyun-Gon
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.121-130
    • /
    • 2006
  • In next generation wireless networks, an application must be capable of rating service information in real-time and prior to initiation of the service it is necessary to check whether the end user's account provides coverage for the requested service. However, to provide prepaid services effectively, credit-control should have minimal latency. In an endeavor to support real-time credit-control for Mobile IPv6 (MIPv6), we design an implementation architecture model of credit-control authorization. The proposed integrated model combines a typical credit-control authorization procedure into the MIPv6 authentication procedure. We implement it on a single server for minimal latency. Thus, the server can perform credit-control authorization and MIPv6 authentication simultaneously. Implementation details are described as software blocks and units. In order to verify the feasibility of the proposed model. latency of credit-control authorization is measured according to various Extensible Authentication Protocol (EAP) authentication mechanisms. The performance results indicate that the proposed approach has considerably low latency compared with the existing separated models, in which credit-control authorization is separated from the MIPv6 authentication.

  • PDF

Coarse grained Simulation Model for Web Application Performance Analysis (웹 애플리케이션 성능 분석을 위한 대략적 시뮬레이션 모델)

  • Kim, Yong-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.25-31
    • /
    • 2008
  • The web has been evolving as an indispensable part of our lives since Berners Lee introduced the first web sever and browser in 1990. From the web end user's point of view, the response time is a matter of concern. Moreover the throughput is an important factor to consider for the system manager's point as well. It's not easy to estimate the performance of a web application because it depends on various elements comprising the whole operational environment of the Internet from networking, client and server computing powers, DBMS and OS capabilities, to application itself. This paper suggests a coarse grained simulation model for web application performance estimation based on the data measured by Buch and Pentkowski [1] and the analytical model proposed by Gunther [2]. The result of the simulation model almost coincides with the measured data and estimates the performance of a new environment.

  • PDF

An Empirical Study on Factors Affecting an Individual User's Behavioral Intention to Use SaaS (개인 사용자의 SaaS 사용의도에 영향을 미치는 요인에 관한 실증적 연구)

  • Hong, Il-Yoo;Lee, Seung-Min;Cho, Hwi-Hyung
    • Informatization Policy
    • /
    • v.25 no.3
    • /
    • pp.75-94
    • /
    • 2018
  • Today, Software as a Service(SaaS) is being recognized as a key means to enable the innovation of software distribution. Despite the increase in the interest in SaaS, individuals as well as businesses are not yet making an extensive use of it. This research is aimed at identifying and analyzing the antecedents of intentions to use SaaS. We proposed a research model to predict an individual's intention to use SaaS based on the Technology Acceptance Model(TAM). To this end, we conducted a questionnaire survey in which actual software users participated. An empirical analysis has been performed to test the reliability and validity and the hypotheses using SPSS and AMOS software packages. The results of the analysis revealed that functionality, interoperability and economic benefits have positive effects on the intention to use SaaS, while system quality has no significant effect on the behavioral intention. We discussed practical as well as academic implications, and provided research directions.