• Title/Summary/Keyword: Heterogeneous computing

Search Result 398, Processing Time 0.023 seconds

Design of Gateway for In-vehicle Sensor Network

  • Kim, Tae-Hwan;Lee, Seung-Il;Hong, Won-Kee
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.73-76
    • /
    • 2005
  • The advanced information and communication technology gives vehicles another role of the third digital space, merging a physical space with a virtual space in a ubiquitous society. In the ubiquitous environment, the vehicle becomes a sensor node, which has a computing and communication capability in the digital space of wired and wireless network. An intelligent vehicle information system with a remote control and diagnosis is one of the future vehicle systems that we can expect in the ubiquitous environment. However, for the intelligent vehicle system, many issues such as vehicle mobility, in-vehicle communication, service platform and network convergence should be resolved. In this paper, an in-vehicle gateway is presented for an intelligent vehicle information system to make an access to heterogeneous networks. It gives an access to the server systems on the internet via CDMA-based hierarchical module architecture. Some experiments was made to find out how long it takes to communicate between a vehicle's intelligent information system and an external server in the various environment. The results show that the average response time amounts to 776ms at fixec place, 707ms at rural area and 910ms at urban area.

  • PDF

정보 시스템 통제 아키텍처를 이용한 정보자원 관리에 관한 실증적 연구

  • Kim, Jeong-Uk
    • Journal of Korean Society for Quality Management
    • /
    • v.28 no.4
    • /
    • pp.29-46
    • /
    • 2000
  • Advent of the distributed computing has contributed to the rapid distribution of information technology throughout the organization. While powerful and user-friendly information technology are more available to end users, managing the distributed, heterogeneous IT environment has become a serious problem for corporate IT managers. Integrated Control Architecture (ICA) enables the monitoring and controlling of the dispersed information resources for effective enterprise-wide information resource management. This paper empirically examines the propositions that the level of information resource control is positively related to IS effectiveness measured in user satisfaction. Measures are developed and validated for the control of information resource object such as data, application, platform, and control of relationships among such objects. Results from a study of 130 organizations support that the organizations with high information resource control exhibit user satisfaction.

  • PDF

Enhanced Cloud Service Discovery for Naïve users with Ontology based Representation

  • Viji Rajendran, V;Swamynathan, S
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.38-57
    • /
    • 2016
  • Service discovery is one of the major challenges in cloud computing environment with a large number of service providers and heterogeneous services. Non-uniform naming conventions, varied types and features of services make cloud service discovery a grueling problem. With the proliferation of cloud services, it has been laborious to find services, especially from Internet-based service repositories. To address this issue, services are crawled and clustered according to their similarity. The clustered services are maintained as a catalogue in which the data published on the cloud provider's website are stored in a standard format. As there is no standard specification and a description language for cloud services, new efficient and intelligent mechanisms to discover cloud services are strongly required and desired. This paper also proposes a key-value representation to describe cloud services in a formal way and to facilitate matching between offered services and demand. Since naïve users prefer to have a query in natural language, semantic approaches are used to close the gap between the ambiguous user requirements and the service specifications. Experimental evaluation measured in terms of precision and recall of retrieved services shows that the proposed approach outperforms existing methods.

A Study on the Automatic Monitoring System for the Contact Center Using Emotion Recognition and Keyword Spotting Method (감성인식과 핵심어인식 기술을 이용한 고객센터 자동 모니터링 시스템에 대한 연구)

  • Yoon, Won-Jung;Kim, Tae-Hong;Park, Kyu-Sik
    • Journal of Internet Computing and Services
    • /
    • v.13 no.3
    • /
    • pp.107-114
    • /
    • 2012
  • In this paper, we proposed an automatic monitoring system for contact center in order to manage customer's complaint and agent's quality. The proposed system allows more accurate monitoring using emotion recognition and keyword spotting method for neutral/anger voice emotion. The system can provide professional consultation and management for the customer with language violence, such as abuse and sexual harassment. We developed a method of building robust algorithm on heterogeneous speech DB of many unspecified customers. Experimental results confirm the stable and improved performance using real contact center speech data.

Novel Architecture of Self-organized Mobile Wireless Sensor Networks

  • Rizvi, Syed;Karpinski, Kelsey;Razaque, Abdul
    • Journal of Computing Science and Engineering
    • /
    • v.9 no.4
    • /
    • pp.163-176
    • /
    • 2015
  • Self-organization of distributed wireless sensor nodes is a critical issue in wireless sensor networks (WSNs), since each sensor node has limited energy, bandwidth, and scalability. These issues prevent sensor nodes from actively collaborating with the other types of sensor nodes deployed in a typical heterogeneous and somewhat hostile environment. The automated self-organization of a WSN becomes more challenging as the number of sensor nodes increases in the network. In this paper, we propose a dynamic self-organized architecture that combines tree topology with a drawn-grid algorithm to automate the self-organization process for WSNs. In order to make our proposed architecture scalable, we assume that all participating active sensor nodes are unaware of their primary locations. In particular, this paper presents two algorithms called active-tree and drawn-grid. The proposed active-tree algorithm uses a tree topology to assign node IDs and define different roles to each participating sensor node. On the other hand, the drawn-grid algorithm divides the sensor nodes into cells with respect to the radio coverage area and the specific roles assigned by the active-tree algorithm. Thus, both proposed algorithms collaborate with each other to automate the self-organizing process for WSNs. The numerical and simulation results demonstrate that the proposed dynamic architecture performs much better than a static architecture in terms of the self-organization of wireless sensor nodes and energy consumption.

Adaptive Proportional Fair Scheduling for WWAN/WLAN Two-Hop Wireless Relay Networks (WWAN/WLAN 2-홉 무선 중계 네트워크를 위한 적응형 비례 공정 스케줄링 기법)

  • Koo, Young-Dae;Park, Joon-Sang;Han, Seung-Jae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.7
    • /
    • pp.743-747
    • /
    • 2008
  • Hierarchical overlay of heterogeneous wireless cells is considered as a promising architecture for next-generation wireless networks. This paper considers a special form of such architecture, WWAN/WLAN two-hop wireless relay networks. We first describe an undesirable scheduling phenomenon that the conventional proportional fair algorithm can cause in such networks. We, then, propose an enhanced proportional fair scheduling to remedy this problem. We demonstrate the performance of the proposed scheme via a simulation of UMTS/WLAN networks using NS-2.

An Ontology-based Context Aware Model for the Implementation of Integrated Security Control System (통합보안관제 시스템 구축을 위한 온톨로지 기반의 상황인식 모델)

  • Han, Kwang-Rok;Kim, Jeong-Bin;Sohn, Surg-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.6
    • /
    • pp.2246-2255
    • /
    • 2010
  • In this paper, we describe an ontology-based context aware model that collects context information from USN sensor and CCTV image and reasons about context in order to development an integrated security control system in the industrial environments. The context model represents autonomous and heterogeneous data as ontologies and recognizes the context through DL(description logic) inference in the smart computing environment. We expect that the integrated security control system can automatically detects the risk in the industrial field and reduces the safety and security incidents by applying this context model to the system.

Designing Hybrid HDD using SLC/MLC combined Flash Memory (SLC/MLC 혼합 플래시 메모리를 이용한 하이브리드 하드디스크 설계)

  • Hong, Seong-Cheol;Shin, Dong-Kun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.7
    • /
    • pp.789-793
    • /
    • 2010
  • Recently, flash memory-based non-volatile cache (NVC) is emerging as an effective solution to enhance both I/O performance and energy consumption of storage systems. To get significant performance and energy gains by NVC, it would be better to use multi-level-cell (MLC) flash memories since it can provide a large capacity of NVC with low cost. However, the number of available program/erase cycles of MLC flash memory is smaller than that of single-level-cell (SLC) flash memory limiting the lifespan of NVC. To overcome such a limitation, SLC/MLC combined flash memory is a promising solution for NVC. In this paper, we propose an effective management scheme for heterogeneous SLC and MLC regions of the combined flash memory.

A P2P Service Protocol using The Open Mobile Network API for The Femtocell based Wireless Enterprise Network (Femtocell을 활용하는 기업무선망 환경을 위한 개방형 모바일 네트워크 API 기반 P2P 서비스 프로토콜)

  • Lee, Sung-Won
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.1
    • /
    • pp.21-28
    • /
    • 2009
  • In this paper, we consider the Femtocell based enterprise wireless network using 2G/3G/4G cellular network technologies. And, we apply the open network service API which enable an easy development of ISP or enterprise services to P2P enterprise services. Based on the proposed scheme, enterprise services can be always connected at anywhere and anytime via heterogeneous devices. By using a qualitative analysis, we evaluate the performance of the proposed scheme and compare with that of the famous P2P service - Skype. Results show that the proposed scheme requests smaller servers and flows with enhanced service quality.

Modeling and Verification of A data registry-based Management System for Network Object (데이타 레지스트리에 기반한 네트워크 객체 관리 시스템의 모델링 및 검증)

  • 최오훈;백두권
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2002.05a
    • /
    • pp.61-65
    • /
    • 2002
  • These days, in order to satisfy the complex and various demands of the customers, the telecommunication networks must provide rapid and flexible services, with the support of efficient service and network management systems. To satisfy these requirements, many objects for management have been released to manage network services and elements. But there are no efficient ways to manage these newly managed objects in object-oriented software. Therefore, we study several problems, when a subsystem using object-oriented technique is implemented. The first problem is that interface works between realized application programs using its technique. The second problem is that reusability of internal managed objects is difficult. In this paper, we will point out some problems and to solve these problems, we have proposed the Object Management System (OMS) architecture, which supports a transparent interface between object-oriented applications and the distributed data repositories. Also in order to manage efficient business objects stored in the different repositories, we suggest a method for integrating dynamic information resources in heterogeneous and distributed network environments. Finally, we applied OMS to TINA(Telecommunication Information Network Architecture) domain, implemented OMS, and verified it with SMV(Symbolic Model Verifier) which is model checking technology.

  • PDF