• Title/Summary/Keyword: IT Resource Sharing

Search Result 297, Processing Time 0.022 seconds

A Study on Inequality Analysis of Academic Information Sharing in University Libraries using Gini's Coefficient and Pareto Ratio (지니계수와 파레토 비율을 활용한 학술정보공유 기여에 대한 대학도서관 격차 분석)

  • Cho, Jane
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.31 no.1
    • /
    • pp.237-255
    • /
    • 2020
  • Pareto principle states that, for many events, roughly 80% of the effects come from 20% of the causes. This study clarified if there is Pareto principle in Korean universities' academic information resource sharing network and calculates the Gini efficient about inequality in sharing academic resources. As a result, top 20% libraries led 80% of performance and inequality degree showed 0.8 as very serious condition. Relative Gini efficient which is recalculated considering scale of each libraries stay 0.7 that is adjusted slightly down. It means that such phenomenon is not caused by the difference of each universities scale with high contribution of big university and low contribution of small university. And in comparison of inequality between university's types, inequality between community colleges and private universities is more serious than four-year-course college and national university respectfully. Finally, as a result of visualizing the distribution of participating libraries, there were libraries with overwhelming contributions, and libraries with small but relatively high contribution levels were also distributed.

Users' Experience of Sharing Economy Service and Moderating Effect of Social Interaction: Focused on Bicycle-Sharing Service (공유경제서비스의 이용경험과 사회적 상호작용의 조절효과: 자전거공유서비스를 중심으로)

  • Yoon, Ah-Young;Kim, Sung-Min;Koo, Chul-Mo
    • The Journal of Information Systems
    • /
    • v.26 no.4
    • /
    • pp.87-106
    • /
    • 2017
  • Purpose The main purpose of this study is to examine whether the expectations and outcomes of the bicycle-sharing service significantly influence users' expectation disconfirmation, satisfaction, and continuous intention to use. In addition, we will verify the moderating effect of social interaction in bicycle-sharing service on the relationship between satisfaction and continuous intention to use. Design/methodology/approach Based on previous studies dealing with determinants of bicycle use, users' expectations and outcomes of the bicycle-sharing service were measured by three variables; accessibility, convenience, and safety. To collect the data, we conducted a survey of undergraduates at a university located in Seoul for three weeks, beginning March 6. Participants completed the first questionnaire, which measured expectations of the bicycle-sharing service based on the attributes and social interaction before using the BSS. After a few weeks, the same participants completed the second questionnaire, which measured outcomes of the outcome, disconfirmation, satisfaction, and continuous intention to use the BSS. Only participants who completed both surveys received monetary compensation. In order to test hypothesis, the Smart Partial Least Square (SmartPLS) modeling technique was applied. Findings In terms of main effects, based on the expectation disconfirmation theory, the results indicated that there were significant relationship among expectation, performance, disconfirmation, and satisfaction. In particular, it was verified that disconfirmation completely plays a mediating role between performance and satisfaction. In addition, the moderating effect of social interaction was examined. There was a significant interaction effects of social interaction and satisfaction on the continuous intention to use for leisure purpose. Finally, this study is expected to contribute to the study of resource sharing in the field of tourism and provide baseline information for future research.

DEVS 형식론을 이용한 다중프로세서 운영체제의 모델링 및 성능평가

  • 홍준성
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1994.10a
    • /
    • pp.32-32
    • /
    • 1994
  • In this example, a message passing based multicomputer system with general interdonnedtion network is considered. After multicomputer systems are developed with morm-hole routing network, topologies of interconecting network are not major considertion for process management and resource sharing. Tehre is an independeent operating system kernel oneach node. It communicates with other kernels using message passingmechanism. Based on this architecture, the problem is how mech does performance degradation will occur in the case of processor sharing on multicomputer systems. Processor sharing between application programs is veryimprotant decision on system performance. In almost cases, application programs running on massively parallel computer systems are not so much user-interactive. Thus, the main performance index is system throughput. Each application program has various communication patterns. and the sharing of processors causes serious performance degradation in hte worst case such that one processor is shared by two processes and another processes are waiting the messages from those processes. As a result, considering this problem is improtant since it gives the reason whether the system allows processor sharingor not. Input data has many parameters in this simulation . It contains the number of threads per task , communication patterns between threads, data generation and also defects in random inupt data. Many parallel aplication programs has its specific communication patterns, and there are computation and communication phases. Therefore, this phase informatin cannot be obtained random input data. If we get trace data from some real applications. we can simulate the problem more realistic . On the other hand, simualtion results will be waseteful unless sufficient trace data with varisous communication patterns is gathered. In this project , random input data are used for simulation . Only controllable data are the number of threads of each task and mapping strategy. First, each task runs independently. After that , each task shres one and more processors with other tasks. As more processors are shared , there will be performance degradation . Form this degradation rate , we can know the overhead of processor sharing . Process scheduling policy can affects the results of simulation . For process scheduling, priority queue and FIFO queue are implemented to support round-robin scheduling and priority scheduling.

  • PDF

Hybrid-clustering game Algorithm for Resource Allocation in Macro-Femto HetNet

  • Ye, Fang;Dai, Jing;Li, Yibing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1638-1654
    • /
    • 2018
  • The heterogeneous network (HetNet) has been one of the key technologies in Long Term Evolution-Advanced (LTE-A) with growing capacity and coverage demands. However, the introduction of femtocells has brought serious co-layer interference and cross-layer interference, which has been a major factor affecting system throughput. It is generally acknowledged that the resource allocation has significant impact on suppressing interference and improving the system performance. In this paper, we propose a hybrid-clustering algorithm based on the $Mat{\acute{e}}rn$ hard-core process (MHP) to restrain two kinds of co-channel interference in the HetNet. As the impracticality of the hexagonal grid model and the homogeneous Poisson point process model whose points distribute completely randomly to establish the system model. The HetNet model based on the MHP is adopted to satisfy the negative correlation distribution of base stations in this paper. Base on the system model, the spectrum sharing problem with restricted spectrum resources is further analyzed. On the basis of location information and the interference relation of base stations, a hybrid clustering method, which takes into accounts the fairness of two types of base stations is firstly proposed. Then, auction mechanism is discussed to achieve the spectrum sharing inside each cluster, avoiding the spectrum resource waste. Through combining the clustering theory and auction mechanism, the proposed novel algorithm can be applied to restrain the cross-layer interference and co-layer interference of HetNet, which has a high density of base stations. Simulation results show that spectral efficiency and system throughput increase to a certain degree.

An Efficient Resource Allocation Scheme For An Integrated Satellite/Terrestrial Networks (위성/지상 겸용 망 내 간섭을 고려한 최적 자원 할당 방식)

  • Park, Unhee;Kim, Hee Wook;Oh, Dae-Sub;Jang, Dae-Ik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.2
    • /
    • pp.298-306
    • /
    • 2015
  • In this paper, we propose an efficient resource allocation scheme for the integrated satellite/terrestrial networks. The proposed scheme is a frequency sharing technique to mitigate the inter-component interferences which can be generated between a satellite beam and terrestrial cells that are operated in the same frequency. The proposed dynamic resource allocation scheme can mitigate the total inter-component interference by optimizing the total transmission power and it can expect a result of which can lead to an increase in capacity. In such a system, the interference situation can be affected by the distributed traffic demands or up/down link communications environments. In this point of view, we evaluate the performance of the total consumed power, the amount of inter-component interference with respect to different traffic distributions and interference environments between the satellite beam and terrestrial systems.

A Priority Time Scheduling Method for Avoiding Gateway Bottleneck in Wireless Mesh Networks (무선 메쉬 네트워크에서 게이트웨이 병목 회피를 위한 우선순위 타임 스케줄링 기법)

  • Ryu, Min Woo;Kim, Dae Young;Cha, Si Ho;Cho, Kuk Hyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.101-107
    • /
    • 2009
  • In existing wireless ad-hoc networks, how to distribute network resources fairly between many users to optimize data transmission is an important research subject. However, in wireless mesh networks (WMNs), it is one of the research areas to avoid gateway bottleneck more than the fair network resource sharing. It is because WMN traffic are concentrated on the gateway connected to backhaul. To solve this problem, the paper proposes Weighted Fairness Time-sharing Access (WFTA). The proposed WFTA is a priority time scheduling scheme based on Weighted Fair Queuing (WFQ).

Study on Intrusion Detection System under Cloud Computing Environment (클라우드 컴퓨팅 환경을 위한 침입탐지시스템 특징 분석)

  • Yang, Hwan-Seok;Lee, Byoung-Cheon;Yoo, Seung-Jea
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.59-65
    • /
    • 2012
  • Clouding computing which is developing newly as IT and network technology develops become changed to internet and service environment of company. Especially, it can lend IT resource at low costs and no need to build up infra. Clouding computing environment become popular more and more because various computing environment using virtualization is provided. The attack threat range also becomes wider in proportion to broaden various connection ways and service supply range at these clouding computing. Therefore, intrusion detection system which can protect resource from various attack having malignant attempts is necessary. In this study, we analyzed about characteristic of intrusion detection system at cloud computing environment having big damage than other computing environment when intrusion happen by sharing of resource and virtualization.

Efficient Virtual Machine Placement Considering System Load (시스템 부하를 고려한 효율적인 가상 머신 배치)

  • Jung, Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.2
    • /
    • pp.35-43
    • /
    • 2020
  • Cloud computing integrates computing resources such as servers, storage, and networks with virtualization technology to provide suitable services according to user needs. Due to the structural characteristics of sharing physical resources based on virtualization technology, threats to availability can occur, so it is essential to respond to availability threats in cloud computing. Existing over-provisioning method is not suitable because it can generate idle resources and cause under-provisioning to degrade or disconnect service. System resources must be allocated in real-time according to the system load to guarantee the cloud system's availability. Through appropriate management measures, it is necessary to reduce the system load and increase the performance of the system. This paper analyzes the work response time according to the allocation or migration of virtual machines and discusses an efficient resource management method considering the system load.

The Development and Management of a Cooperative Storage Facility for Academic Libraries in Korea (우리나라 대학도서관 공동보존서고의 구축 및 운영에 관한 연구)

  • Yoon, Cheong-Ok;Shim, Kyung;Kwack, Dong-Chul
    • Journal of Korean Library and Information Science Society
    • /
    • v.38 no.3
    • /
    • pp.25-51
    • /
    • 2007
  • The purpose of this study is to suggest the characteristics of a cooperative storage facility for academic libraries in Korea. For this facility, discussed are how to select a site, build physical facilities, recruit participating organizations, prepare for selection criteria and ownership of resources, confirm service policies, and implement a integrated library management and access system. It is emphasized that a cooperative storage facility for academic libraries in Korea should ensure the optimum use of space on campus, preserve "the last copy" which is not frequently used, but still has scholarly values, and extend the effective and efficient resource sharing among participating libraries.

  • PDF

Possibility of Disclosure of User Information in Internet Explorer (인터넷 익스플로러에서 사용자 정보 유출 가능성)

  • Lee, SangHo;Maeng, YoungJae;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.12
    • /
    • pp.937-943
    • /
    • 2013
  • Internet Explorer is the popular internet browser the most in domestic. In some version of Internet Explorer, user information could be leaked cause CORS(Cross-Origin Resource Sharing) Internet Explorer support. Different before, without setup a malicious program, attacker can get the user information even account information, credit card usage list and user information with SNS or internet portal site logged in regardless of secure program. Not only Internet Explorer but also mobile browser, it could be. In this paper, we make study of the potential disclosure of user information by attack using CORS, second attack and the way to improvement of vulnerability of CORS.