• Title/Summary/Keyword: Software service

Search Result 2,457, Processing Time 0.027 seconds

Dominance-Based Service Selection Scheme with Concurrent Requests

  • Tang, Chaogang;Li, Qing;Xiong, Yan;Wen, Shiting;Liu, An;Zhong, Farong
    • Journal of Computing Science and Engineering
    • /
    • v.6 no.2
    • /
    • pp.89-104
    • /
    • 2012
  • In dynamic Web service environments, the performance of the Internet is unpredictable; the reliability and effectiveness of remote Web services are also unclear. Therefore, it can hardly be guaranteed that the quality of Web service (QoWS) attributes of Web services do not fluctuate with the dynamic Web service environments. When a composite service is planned in the context of dynamic service environments, there is another aspect which has not been taken into account by existing works, namely, concurrency - the fact that multiple requests to a composite service may arrive at the same time. Considering the dynamics of Web service environments and concurrency of requests, we propose in this paper a service selection scheme which adopts top-k dominating queries to generate a composition solution rather than only select the best composition solution for a given request. The experimental results have investigated the efficiency and effectiveness of our approach and shown that it outperforms baseline and traditional methods for service selection.

U-Learning of 21 Century University Education Paradigm (21세기 대학교육 패러다임의 U-Learning)

  • Park, Chun-Myoug
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.3 no.1
    • /
    • pp.69-75
    • /
    • 2011
  • This paper presents a model of e-learning based on ubiquitous computing configuration. First of all, we survey the advanced e-learning systems for foreign and domestic universities. Next we propose the optimal e-learning model based on ubiquitous computing configuration. The proposed e-learning model as following. we propose the e-learning system's hardware and software configurations, that are server and networking systems. Also, we construct the proposed e-learning systems's services. There are attendance and absence service, class management service, common knowledge service, score processing service, facilities management service, personal management service, personal authorization issue management service, campus guide service, lecture-hall management service. Then we propose the laboratory equipment management service, experimental materials management service etc. The proposed model of e-learning based on ubiquitous computing configuration will be able to contribute to the next generation university educational paradigm.

  • PDF

The Effects on Satisfaction for Free Food Service of Elementary and Middle School Students in Chungnam Province (충남 지역 초·중학생의 무상학교급식 만족도에 미치는 영향)

  • Kim, Ho;Yang, Sung-Bum
    • The Korean Journal of Food And Nutrition
    • /
    • v.30 no.3
    • /
    • pp.427-432
    • /
    • 2017
  • The objective of this study to investigate the satisfaction of elementary and middle school students in Chungnam province. We surveyed related to school food service, concerns about food ingredients and dietary life, perceptions of free school food service and satisfaction the quality and management of the school food service. Furthermore, this survey with the previous. Compared to year, frequency of education related to school food service and concerns about food ingredients and dietary life. Perception on free school food service increased 1.2%, not statistically significant. Satisfaction for the quality of the school food service statistically significant increase compared to 2015. ore individuals educated the foods' county-of-origin and a higher concern the food materials and dietary life, subsequently higher satisfaction for the quality and management of school food service. The results of this study suggest that concern and concentration on software of school food service such as education and guide are important.

Enhancing Service Availability in Multi-Access Edge Computing with Deep Q-Learning

  • Lusungu Josh Mwasinga;Syed Muhammad Raza;Duc-Tai Le ;Moonseong Kim ;Hyunseung Choo
    • Journal of Internet Computing and Services
    • /
    • v.24 no.2
    • /
    • pp.1-10
    • /
    • 2023
  • The Multi-access Edge Computing (MEC) paradigm equips network edge telecommunication infrastructure with cloud computing resources. It seeks to transform the edge into an IT services platform for hosting resource-intensive and delay-stringent services for mobile users, thereby significantly enhancing perceived service quality of experience. However, erratic user mobility impedes seamless service continuity as well as satisfying delay-stringent service requirements, especially as users roam farther away from the serving MEC resource, which deteriorates quality of experience. This work proposes a deep reinforcement learning based service mobility management approach for ensuring seamless migration of service instances along user mobility. The proposed approach focuses on the problem of selecting the optimal MEC resource to host services for high mobility users, thereby reducing service migration rejection rate and enhancing service availability. Efficacy of the proposed approach is confirmed through simulation experiments, where results show that on average, the proposed scheme reduces service delay by 8%, task computing time by 36%, and migration rejection rate by more than 90%, when comparing to a baseline scheme.

Optimization Methodology for Sales and Operations Planning by Stochastic Programming under Uncertainty : A Case Study in Service Industry (불확실성하에서의 확률적 기법에 의한 판매 및 실행 계획 최적화 방법론 : 서비스 산업)

  • Hwang, Seon Min;Song, Sang Hwa
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.4
    • /
    • pp.137-146
    • /
    • 2016
  • In recent years, business environment is faced with multi uncertainty that have not been suffered in the past. As supply chain is getting expanded and longer, the flow of information, material and production is also being complicated. It is well known that development service industry using application software has various uncertainty in random events such as supply and demand fluctuation of developer's capcity, project effective date after winning a contract, manpower cost (or revenue), subcontract cost (or purchase), and overrun due to developer's skill-level. This study intends to social contribution through attempts to optimize enterprise's goal by supply chain management platform to balance demand and supply and stochastic programming which is basically applied in order to solve uncertainty considering economical and operational risk at solution supplier. In Particular, this study emphasizes to determine allocation of internal and external manpower of developers using S&OP (Sales & Operations Planning) as monthly resource input has constraint on resource's capability that shared in industry or task. This study is to verify how Stochastic Programming such as Markowitz's MV (Mean Variance) model or 2-Stage Recourse Model is flexible and efficient than Deterministic Programming in software enterprise field by experiment with process and data from service industry which is manufacturing software and performing projects. In addition, this study is also to analysis how profit and labor input plan according to scope of uncertainty is changed based on Pareto Optimal, then lastly it is to enumerate limitation of the study extracted drawback which can be happened in real business environment and to contribute direction in future research considering another applicable methodology.

A Design and Implementation of Application virtualization method using virtual supporting system and Copy-on-Write scheme (가상화 지원 시스템과 Copy-on-Write 방법을 이용한 응용프로그램 가상화 방법의 설계 및 구현)

  • Choi, Won Hyuk;Choi, Ji Hoon;Kim, Won-Young;Choi, Wan
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.807-811
    • /
    • 2007
  • In this paper, we introduce an application virtualization method that could be supported without changing and modifying any resources and execution environment on host system, using non-installable portable software format that could be executed by one-click on any host without installing process. For the purpose of designing and implementing an application virtualization method, we construct virtual supporting system that includes virtual file system and virtual registry hive on kernel level of Windows operating system. Also, when users execute portable software on any hosts to provide consistency on using portable software, we describe method of processing information of appending and modifying files and registry datum on virtual file system and virtual registry hive through Copy-on-Write scheme.

  • PDF

A Web Service System Analysis Method Using Petri Net with Queue (대기행렬 페트리넷을 이용한 웹서비스 시스템 분석 방법)

  • Shim, Kyu-Bark;Yim, Jae-Geol;Lee, Gye-Young;Kim, Jin-Seog
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.11
    • /
    • pp.1409-1419
    • /
    • 2011
  • It is well known that estimating the system processing time and cost at the early stage of the software system development is very important, and many Petri net methods of analysing processing time have been published. In another field of computer science, web service has been widely studied as a key of an efficient application software development method. Considering these two phenomena, this paper introduces a Petri net method of analysing the process time of application software consisting of web services. It is not plausible to represent the process time of a web application system as a constant. Therefore, we propose to use "Petri net with queues" to represent a web application system. The main contribution of this paper is to introduce a method of analysing a "Petri net with queues".

A Study on the PKI based Technology for Internet Banking Service in the Open Software Environment (공개 소프트웨어 환경에서의 인터넷 뱅킹 서비스를 위한 PKI 기반 기술에 대한 연구)

  • Han, Myung-Mook;Lee, Chul-Soo
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.13-20
    • /
    • 2006
  • Since the domestic internet banking environment has established for Microsoft Internet Explorer (IE), the internet banking service is not able to use in the open operating system and web browser such as linux and freeBSD. To solve the :problem, we develop the digital signature system used the seed for the digital payment system in the open software environment. Because the domestic internet banking performs the certificate and digital signature verification through official certificate that the official certificate authority issues, we analyze and develop the verification of validity system for the official certificate. Since the virtual internet banking environment is already established in the web server developing under the self-abilities, the basic internet banking service can be performed installing the certificate in the client which has the mozilla porting the seed. Finally, we can confirm that the certificate and digital signature are performed normally through the experiment.

  • PDF

A Study on the Detection Technique of DDoS Attacks on the Software-Defined Networks (소프트웨어-정의 네트워크에서 분산형 서비스 거부(DDoS) 공격에 대한 탐지 기술 연구)

  • Kim, SoonGohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.1
    • /
    • pp.81-87
    • /
    • 2020
  • Recently, the network configuration is being rapidly changed to enable easy and free network service configuration based on SDN/NFV. Despite the many advantages and applications of SDN, many security issues such as Distributed Denial of Service (DDoS) attacks are being constantly raised as research issues. In particular, the effectiveness of DDoS attacks is much faster, SDN is causing more and more fatal damage. In this paper, we propose an entropy-based technique to detect and mitigate DDoS attacks in SDN, and prove it through experiments. The proposed scheme is designed to mitigate these attacks by detecting DDoS attacks on single and multiple victim systems and using time - specific techniques. We confirmed the effectiveness of the proposed scheme to reduce packet loss rate by 20(19.86)% while generating 3.21% network congestion.

Secure Scheme Between Nodes in Cloud Robotics Platform (Cloud Robotics Platform 환경에서 Node간 안전한 통신 기법)

  • Kim, Hyungjoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.12
    • /
    • pp.595-602
    • /
    • 2021
  • The robot is developing into a software-oriented shape that recognizes the surrounding situation and is given a task. Cloud Robotics Platform is a method to support Service Oriented Architecture shape for robots, and it is a cloud-based method to provide necessary tasks and motion controllers depending on the situation. As it evolves into a humanoid robot, the robot will be used to help humans in generalized daily life according to the three robot principles. Therefore, in addition to robots for specific individuals, robots as public goods that can help all humans depending on the situation will be universal. Therefore, the importance of information security in the Cloud Robotics Computing environment is analyzed to be composed of people, robots, service applications on the cloud that give intelligence to robots, and a cloud bridge that connects robots and clouds. It will become an indispensable element for In this paper, we propose a Security Scheme that can provide security for communication between people, robots, cloud bridges, and cloud systems in the Cloud Robotics Computing environment for intelligent robots, enabling robot services that are safe from hacking and protect personal information.