• 제목/요약/키워드: Internet Information Resources

검색결과 1,148건 처리시간 0.021초

Challenges and Issues of Resource Allocation Techniques in Cloud Computing

  • Abid, Adnan;Manzoor, Muhammad Faraz;Farooq, Muhammad Shoaib;Farooq, Uzma;Hussain, Muzammil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권7호
    • /
    • pp.2815-2839
    • /
    • 2020
  • In a cloud computing paradigm, allocation of various virtualized ICT resources is a complex problem due to the presence of heterogeneous application (MapReduce, content delivery and networks web applications) workloads having contentious allocation requirements in terms of ICT resource capacities (resource utilization, execution time, response time, etc.). This task of resource allocation becomes more challenging due to finite available resources and increasing consumer demands. Therefore, many unique models and techniques have been proposed to allocate resources efficiently. However, there is no published research available in this domain that clearly address this research problem and provides research taxonomy for classification of resource allocation techniques including strategic, target resources, optimization, scheduling and power. Hence, the main aim of this paper is to identify open challenges faced by the cloud service provider related to allocation of resource such as servers, storage and networks in cloud computing. More than 70 articles, between year 2007 and 2020, related to resource allocation in cloud computing have been shortlisted through a structured mechanism and are reviewed under clearly defined objectives. Lastly, the evolution of research in resource allocation techniques has also been discussed along with salient future directions in this area.

Resource Allocation and Offloading Decisions of D2D Collaborative UAV-assisted MEC Systems

  • Jie Lu;Wenjiang Feng;Dan Pu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권1호
    • /
    • pp.211-232
    • /
    • 2024
  • In this paper, we consider the resource allocation and offloading decisions of device-to-device (D2D) cooperative UAV-assisted mobile edge computing (MEC) system, where the device with task request is served by unmanned aerial vehicle (UAV) equipped with MEC server and D2D device with idle resources. On the one hand, to ensure the fairness of time-delay sensitive devices, when UAV computing resources are relatively sufficient, an optimization model is established to minimize the maximum delay of device computing tasks. The original non-convex objective problem is decomposed into two subproblems, and the suboptimal solution of the optimization problem is obtained by alternate iteration of two subproblems. On the other hand, when the device only needs to complete the task within a tolerable delay, we consider the offloading priorities of task to minimize UAV computing resources. Then we build the model of joint offloading decision and power allocation optimization. Through theoretical analysis based on KKT conditions, we elicit the relationship between the amount of computing task data and the optimal resource allocation. The simulation results show that the D2D cooperation scheme proposed in this paper is effective in reducing the completion delay of computing tasks and saving UAV computing resources.

IoT 서비스 활성화를 위한 IoT 정보공유 오픈 마켓 비즈니스 모델 (The Business Model of IoT Information Sharing Open Market for Promoting IoT Service)

  • 김우성
    • 한국IT서비스학회지
    • /
    • 제15권3호
    • /
    • pp.195-209
    • /
    • 2016
  • IoT (Internet of Things) is a collective term referring to application services that provide information through sensors/devices connected to the internet. The real world application of IoT is expanding fast along with growing number of sensors/devices. However, since IoT application relies on vertical combination of sensors/devices networks, information sharing within IoT services remains unresolved challenge. Consequently, IoT sensors/devices demand high construction and maintenance costs, rendering the creation of new IoT services potentially expensive. One solution is to launch an IoT open market for information sharing similar to that of App Store for smart-phones. Doing so will efficiently allow novel IoT services to emerge across various industries, because developers can purchase licenses to access IoT resources directly via an open market. Sharing IoT resource information through an open market will create an echo-system conducive for easy utilization of resources and communication between IoT service providers, resource owners, and developers. This paper proposes the new business model of IoT open market for information sharing, and the requirements for ensuring security and standardization of open markets.

A cross-domain access control mechanism based on model migration and semantic reasoning

  • Ming Tan;Aodi Liu;Xiaohan Wang;Siyuan Shang;Na Wang;Xuehui Du
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권6호
    • /
    • pp.1599-1618
    • /
    • 2024
  • Access control has always been one of the effective methods to protect data security. However, in new computing environments such as big data, data resources have the characteristics of distributed cross-domain sharing, massive and dynamic. Traditional access control mechanisms are difficult to meet the security needs. This paper proposes CACM-MMSR to solve distributed cross-domain access control problem for massive resources. The method uses blockchain and smart contracts as a link between different security domains. A permission decision model migration method based on access control logs is designed. It can realize the migration of historical policy to solve the problems of access control heterogeneity among different security domains and the updating of the old and new policies in the same security domain. Meanwhile, a semantic reasoning-based permission decision method for unstructured text data is designed. It can achieve a flexible permission decision by similarity thresholding. Experimental results show that the proposed method can reduce the decision time cost of distributed access control to less than 28.7% of a single node. The permission decision model migration method has a high decision accuracy of 97.4%. The semantic reasoning-based permission decision method is optimal to other reference methods in vectorization and index time cost.

An IoT based Green Home Architecture for Green Score Calculation towards Smart Sustainable Cities

  • Kumaran, K. Manikanda;Chinnadurai, M.;Manikandan, S.;Murugan, S. Palani;Elakiya, E.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권7호
    • /
    • pp.2377-2398
    • /
    • 2021
  • In the recent modernized world, utilization of natural resources (renewable & non-renewable) is increasing drastically due to the sophisticated life style of the people. The over-consumption of non-renewable resources causes pollution which leads to global warming. Consequently, government agencies have been taking several initiatives to control the over-consumption of non-renewable natural resources and encourage the production of renewable energy resources. In this regard, we introduce an IoT powered integrated framework called as green home architecture (GHA) for green score calculation based on the usage of natural resources for household purpose. Green score is a credit point (i.e.,10 pts) of a family which can be calculated once in a month based on the utilization of energy, production of renewable energy and pollution caused. The green score can be improved by reducing the consumption of energy, generation of renewable energy and preventing the pollution. The main objective of GHA is to monitor the day-to-day usage of resources and calculate the green score using the proposed green score algorithm. This algorithm gives positive credits for economic consumption of resources and production of renewable energy and also it gives negative credits for pollution caused. Here, we recommend a green score based tax calculation system which gives tax exemption based on the green score value. This direct beneficiary model will appreciate and encourage the citizens to consume fewer natural resources and prevent pollution. Rather than simply giving subsidy, this proposed system allows monitoring the subsidy scheme periodically and encourages the proper working system with tax exemption rewards. Also, our GHA will be used to monitor all the household appliances, vehicles, wind mills, electricity meter, water re-treatment plant, pollution level to read the consumption/production in appropriate units by using the suitable sensors. These values will be stored in mass storage platform like cloud for the calculation of green score and also employed for billing purpose by the government agencies. This integrated platform can replace the manual billing and directly benefits the government.

Mobile Junk Message Filter Reflecting User Preference

  • Lee, Kyoung-Ju;Choi, Deok-Jai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권11호
    • /
    • pp.2849-2865
    • /
    • 2012
  • In order to block mobile junk messages automatically, many studies on spam filters have applied machine learning algorithms. Most previous research focused only on the accuracy rate of spam filters from the view point of the algorithm used, not on individual user's preferences. In terms of individual taste, the spam filters implemented on a mobile device have the advantage over spam filters on a network node, because it deals with only incoming messages on the users' phone and generates no additional traffic during the filtering process. However, a spam filter on a mobile phone has to consider the consumption of resources, because energy, memory and computing ability are limited. Moreover, as time passes an increasing number of feature words are likely to exhaust mobile resources. In this paper we propose a spam filter model distributed between a users' computer and smart phone. We expect the model to follow personal decision boundaries and use the uniform resources of smart phones. An authorized user's computer takes on the more complex and time consuming jobs, such as feature selection and training, while the smart phone performs only the minimum amount of work for filtering and utilizes the results of the information calculated on the desktop. Our experiments show that the accuracy of our method is more than 95% with Na$\ddot{i}$ve Bayes and Support Vector Machine, and our model that uses uniform memory does not affect other applications that run on the smart phone.

A Workflow Scheduling Technique Using Genetic Algorithm in Spot Instance-Based Cloud

  • Jung, Daeyong;Suh, Taeweon;Yu, Heonchang;Gil, JoonMin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권9호
    • /
    • pp.3126-3145
    • /
    • 2014
  • Cloud computing is a computing paradigm in which users can rent computing resources from service providers according to their requirements. A spot instance in cloud computing helps a user to obtain resources at a lower cost. However, a crucial weakness of spot instances is that the resources can be unreliable anytime due to the fluctuation of instance prices, resulting in increasing the failure time of users' job. In this paper, we propose a Genetic Algorithm (GA)-based workflow scheduling scheme that can find the optimal task size of each instance in a spot instance-based cloud computing environment without increasing users' budgets. Our scheme reduces total task execution time even if an out-of-bid situation occurs in an instance. The simulation results, based on a before-and-after GA comparison, reveal that our scheme achieves performance improvements in terms of reducing the task execution time on average by 7.06%. Additionally, the cost in our scheme is similar to that when GA is not applied. Therefore, our scheme can achieve better performance than the existing scheme, by optimizing the task size allocated to each available instance throughout the evolutionary process of GA.

Trade-off between Resource Efficiency and Fast Protection for Shared Mesh Protection

  • Cho, Choong-hee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권7호
    • /
    • pp.2568-2588
    • /
    • 2021
  • Shared mesh protection (SMP) protects traffic against failures occurring in a working path, as with linear protection, and allows resource sharing of protection paths with different endpoints. The SMP mechanism coordinates multiple protection paths that require shared resources when failures occur on multiple working paths. When multiple failures occur in SMP networks sharing limited resources, activation can fail because some of the resources in the protection path are already in use. In this case, a node confirming that a resource is not available has the option to wait until the resource is available or to withdraw activation of the protection path. In this study, we recognize that the protection switching time and the number of protected services can be different, depending on which option is used for SMP networks. Moreover, we propose a detailed design for the implementation of SMP by considering options and algorithms that are commonly needed for network nodes. A simulation shows the performance of an SMP system implemented with the proposed design and utilizing two options. The results demonstrate that resource utilization can be increased or protection switching time can be shortened depending on the option selected by the network administrator.

전자정보원의 공동편목을 위한 상호협력 시스템에 관한 연구 -특히 OCLC의 CORC를 중심으로- (Cooperative Cataloging System for Online Resources -With a Special Regard to CORC -)

  • 여지숙;오동근
    • 한국도서관정보학회지
    • /
    • 제33권1호
    • /
    • pp.193-210
    • /
    • 2002
  • 이 연구에서는 전자정보원(electronic resources)을 효율적으로 정리해서 제공하기 위해 웹사이트에서 양질의 인터넷 정보원의 위치를 확인하기 위한 참고도구로써 실험하고 있는 OCLC의 CORC (Cooperative Outline Resource Catalog)의 역사와 특징, 운영 등에 대해 종합적으로 분석하였다. 또한 이를 바탕으로 국내 도서관이 당면한 관련문제를 해결하고 유사한 시스템을 도입하기 위한 제안을 제시하였다.

  • PDF

인터넷포털과 인터넷서점의 어린이자료 분류시스템의 비교분석 (A Comparative Analysis on Classification Systems for Children's Materials of Internet Portals and Online Bookstores)

  • 배영활;오동근;여지숙
    • 한국도서관정보학회지
    • /
    • 제39권3호
    • /
    • pp.321-344
    • /
    • 2008
  • 이 연구는 어린이자료의 분류시스템 구축을 위한 한 방안으로 어린이들이 즐겨 찾는 국내 인터넷 포털과 어린이전문 인터넷 사이트의 디렉토리 구분 및 계층성과 인터넷서점의 어린이도서에 대한 항목구분과 계층성을 비교분석하였다. 이를 토대로 인터넷 포털에서 체계적이고 효율적인 어린이자료의 분류체계를 구성하기 위한 몇 가지 지침을 제시한 바, 그 내용은 다음과 같다. (1) 어린이네티즌들의 정보요구와 이용행태를 반영해야 한다. (2) 어린이들의 관점과 표현에 따른 용어를 선정하고 연령별 기준을 제시할 필요가 있다. (3) 이용자의 접근성과 편의성을 위해 명확한 계층성과 군집성을 유지해야 한다. (4) 주제나 개념중심의 카테고리에 어린이들의 활동과 대상을 보완하는 절충방식의 카테고리를 설정하는 것이 바람직할 것이다. (5) 교과목중심의 카테고리에 상상력과 호기심을 지속적으로 충족시켜 줄 수 있는 카테고리를 설정하고 상세한 주제별 세분을 추가할 필요가 있다.

  • PDF