• Title/Summary/Keyword: cloud computing systems

Search Result 602, Processing Time 0.023 seconds

A Study on the Current Status and Perception of Library Automation Systems for System Improvement (도서관자동화시스템 개선을 위한 현황 및 인식 연구)

  • Byoung-goon An;Youngim Jung;Hyekyong Hwang
    • Journal of Korean Library and Information Science Society
    • /
    • v.55 no.1
    • /
    • pp.263-288
    • /
    • 2024
  • This study aims to analyze the current status of library automation systems and explore future directions for improvement. The study was conducted by surveying librarians at institutions participating in the KESLI and KCUE consortia to investigate the current status and satisfaction with library automation systems, and the current status and awareness of open source-based library automation systems. The study found that most automation systems currently in use in libraries were developed through outsourcing in the 2000s or 2010s, and that more than 50% of respondents were satisfied with the overall library automation system. Overall satisfaction was found to be influenced by satisfaction with the functionality, customer support services and construction and operational management of the system. Most current library automation systems are not based on open source software or cloud services, but the intention to use them in the future is high, with more than 40% of respondents saying they would use them within three years. This study is expected to serve as an important foundation for building an open source-based library automation system in the future.

Study on Memory Performance Improvement based on Machine Learning (머신러닝 기반 메모리 성능 개선 연구)

  • Cho, Doosan
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.615-619
    • /
    • 2021
  • This study focuses on memory systems that are optimized to increase performance and energy efficiency in many embedded systems such as IoT, cloud computing, and edge computing, and proposes a performance improvement technique. The proposed technique improves memory system performance based on machine learning algorithms that are widely used in many applications. The machine learning technique can be used for various applications through supervised learning, and can be applied to a data classification task used in improving memory system performance. Data classification based on highly accurate machine learning techniques enables data to be appropriately arranged according to data usage patterns, thereby improving overall system performance.

Deep Reinforcement Learning Based Distributed Offload Policy for Collaborative Edge Computing in Multi-Edge Networks (멀티 엣지 네트워크에서 협업 엣지컴퓨팅을 위한 심층강화학습 기반 분산 오프로딩 정책 연구)

  • Junho Jeong;Joosang Youn
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.29 no.5
    • /
    • pp.11-19
    • /
    • 2024
  • As task offloading from user devices transitions from the cloud to the edge, the demand for efficient resource management techniques has emerged. While numerous studies have employed reinforcement learning to address this challenge, many fail to adequately consider the overhead associated with real-world offloading tasks. This paper proposes a reinforcement learning-based distributed offloading policy generation method that incorporates task overhead. A simulation environment is constructed to validate the proposed approach. Experimental results demonstrate that the proposed method reduces edge queueing time, achieving up to 46.3% performance improvement over existing approaches.

Performance Measurement Framework for Efficient Virtualization System Profiling (효율적인 가상화 시스템 프로파일링을 위한 성능측정 프레임워크)

  • Jang, Eun-Tae;Choi, Sang-Hoon;Park, Ki-Woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.3
    • /
    • pp.31-39
    • /
    • 2019
  • Virtualization technology is one of the technologies that have been attracting attention as cloud computing spreads recently. When a system is constructed using virtualization technology, mutiple operation systems can be operated in a single host operating system, thereby facilitating efficient management of computing resources. As more and more operating systems are running on the hypervisor, it is important to measure the overall performance of the virtualization system and this is becoming an important technology. In this paper, we analyze the main functions of the existing profiling tools to measure the performance of the virtualization system, and measure and classify the profiling coverage that the monitoring tools can perform for events that may occur in the virtualization system. In addition, we have studied a framework that enables performance measurement by loading appropriate profiling tools into the guest system when performance measurement is required for the virtualization system according to the information received from the remote system performing the monitoring.

Auto Regulated Data Provisioning Scheme with Adaptive Buffer Resilience Control on Federated Clouds

  • Kim, Byungsang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5271-5289
    • /
    • 2016
  • On large-scale data analysis platforms deployed on cloud infrastructures over the Internet, the instability of the data transfer time and the dynamics of the processing rate require a more sophisticated data distribution scheme which maximizes parallel efficiency by achieving the balanced load among participated computing elements and by eliminating the idle time of each computing element. In particular, under the constraints that have the real-time and limited data buffer (in-memory storage) are given, it needs more controllable mechanism to prevent both the overflow and the underflow of the finite buffer. In this paper, we propose an auto regulated data provisioning model based on receiver-driven data pull model. On this model, we provide a synchronized data replenishment mechanism that implicitly avoids the data buffer overflow as well as explicitly regulates the data buffer underflow by adequately adjusting the buffer resilience. To estimate the optimal size of buffer resilience, we exploits an adaptive buffer resilience control scheme that minimizes both data buffer space and idle time of the processing elements based on directly measured sample path analysis. The simulation results show that the proposed scheme provides allowable approximation compared to the numerical results. Also, it is suitably efficient to apply for such a dynamic environment that cannot postulate the stochastic characteristic for the data transfer time, the data processing rate, or even an environment where the fluctuation of the both is presented.

QoS and SLA Aware Web Service Composition in Cloud Environment

  • Wang, Dandan;Ding, Hao;Yang, Yang;Mi, Zhenqiang;Liu, Li;Xiong, Zenggang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5231-5248
    • /
    • 2016
  • As a service-oriented paradigm, web service composition has obtained great attention from both academia and industry, especially in the area of cloud service. Nowadays more and more web services providing the same function but different in QoS are available in cloud, so an important mission of service composition strategy is to select the optimal composition solution according to QoS. Furthermore, the selected composition solution should satisfy the service level agreement (SLA) which defines users' request for the performance of composite service, such as price and response time. A composite service is feasible only if its QoS satisfies user's request. In order to obtain composite service with the optimal QoS and avoid SLA violations simultaneously, in this paper we first propose a QoS evaluation method which takes the SLA satisfaction into account. Then we design a service selection algorithm based on our QoS evaluation method. At last, we put forward a parallel running strategy for the proposed selection algorithm. The simulation results show that our approach outperforms existing approaches in terms of solutions' optimality and feasibility. Through our running strategy, the computation time can be reduced to a large extent.

Resource Prediction Technique based on Expected Value in Cloud Computing (클라우드 환경에서 기대 값 기반의 동적 자원 예측 기법)

  • Choi, Yeongho;Lim, Yujin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.3
    • /
    • pp.81-84
    • /
    • 2015
  • Cloud service is one of major technologies in modern IT business. Due to the dynamics of user demands, service providers need VM(Virtual Machine) provisioning mechanism to predict the amount of resources demanded by cloud users for the next service and to prepare the resources. VM provisioning provides the QoS to cloud user and maximize the revenue of a service provider by minimizing the expense. In this paper, we propose a new VM provisioning technique to minimize the total expense of a service provider by minimizing the expected value of the expense based on the predicted demands of users. To evaluate the effectiveness of our prediction technique, we compare the total expense of our technique with these of the other prediction techniques with a series of real trace data.

Design of OpenStack Cloud Storage Systems - Applying Infiniband Storage Network and Storage Virtualization Performance Evaluation (인피니밴드 스토리지 네트워크를 적용한 오픈스택 클라우드 스토리지 시스템의 설계 및 스토리지 가상화 성능평가)

  • Heo, Hui-Seong;Lee, Kwang-Soo;Pirahandeh, Mehdi;Kim, Deok-Hwan
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.7
    • /
    • pp.470-475
    • /
    • 2015
  • Openstack is an open source software that enables developers to build IaaS(Infrastructure as a Service) cloud platforms. Openstack can virtualize servers, networks and storages, and provide them to users. This paper proposes the structure of Openstack cloud storage system applying Infiniband to solve bottlenecking that may occur between server and storage nodes when the server performs an I/O operation. Furthermore, we implement all flash array based high-performance Cinder storage volumes which can be used at Nova virtual machines by applying distributed RAID-60 structures to three 8-bay SSD storages and show that Infiniband storage networks applied to Openstack is suitable for virtualizing high-performance storage.

A Study on ACAS for Enhanced Security in Cloud Virtualization Internal Environment (ACAS를 통한 클라우드 가상화 내부 환경 보안성 강화 연구)

  • Park, Tae-Sung;Choi, Do-Hyeon;Do, Kyoung-Hwa;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1355-1362
    • /
    • 2012
  • As the utilization of cloud computing service rapidly increases to meet demands for various forms of service recently, the virtualization technology has made a rapid rise, further leading to some issues related to security, such as safety and reliability. As a system to provide environments what multiple virtual operating systems can be loaded, hypervisors may be a target of various attacks, such as control loss and authority seizure, since all the agents fcan be damaged by a malicious access to the virtualization layer. Therefore, this paper was conducted to investigate the access control for agents and suggest a plan to control malicious accesses to the cloud virtualization internal environment. The suggested technique was verified not to have effect on the performance of the system and environment through an analysis of its performance.

Cloud Security Scheme Based on Blockchain and Zero Trust (블록체인과 제로 트러스트 기반 클라우드 보안 기법)

  • In-Hye Na;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.55-60
    • /
    • 2023
  • Recently, demand for cloud computing has increased and remote access due to home work and external work has increased. In addition, a new security paradigm is required in the current situation where the need to be vigilant against not only external attacker access but also internal access such as internal employee access to work increases and various attack techniques are sophisticated. As a result, the network security model applying Zero-Trust, which has the core principle of doubting everything and not trusting it, began to attract attention in the security industry. Zero Trust Security monitors all networks, requires authentication in order to be granted access, and increases security by granting minimum access rights to access requesters. In this paper, we explain zero trust and zero trust architecture, and propose a new cloud security system for strengthening access control that overcomes the limitations of existing security systems using zero trust and blockchain and can be used by various companies.