• Title/Summary/Keyword: computing environment

Search Result 3,243, Processing Time 0.025 seconds

A Predictive Virtual Machine Placement in Decentralized Cloud using Blockchain

  • Suresh B.Rathod
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.60-66
    • /
    • 2024
  • Host's data during transmission. Data tempering results in loss of host's sensitive information, which includes number of VM, storage availability, and other information. In the distributed cloud environment, each server (computing server (CS)) configured with Local Resource Monitors (LRMs) which runs independently and performs Virtual Machine (VM) migrations to nearby servers. Approaches like predictive VM migration [21] [22] by each server considering nearby server's CPU usage, roatative decision making capacity [21] among the servers in distributed cloud environment has been proposed. This approaches usage underlying server's computing power for predicting own server's future resource utilization and nearby server's resource usage computation. It results in running VM and its running application to remain in waiting state for computing power. In order to reduce this, a decentralized decision making hybrid model for VM migration need to be proposed where servers in decentralized cloud receives, future resource usage by analytical computing system and takes decision for migrating VM to its neighbor servers. Host's in the decentralized cloud shares, their detail with peer servers after fixed interval, this results in chance to tempering messages that would be exchanged in between HC and CH. At the same time, it reduces chance of over utilization of peer servers, caused due to compromised host. This paper discusses, an roatative decisive (RD) approach for VM migration among peer computing servers (CS) in decentralized cloud environment, preserving confidentiality and integrity of the host's data. Experimental result shows that, the proposed predictive VM migration approach reduces extra VM migration caused due over utilization of identified servers and reduces number of active servers in greater extent, and ensures confidentiality and integrity of peer host's data.

Cloud Computing Acceptance at Individual Level Based on Extended UTAUT (확장된 UTAUT 모형에 기반한 개인차원에서의 클라우드 컴퓨팅 수용)

  • Jung, Chul Ho;Namn, Su Hyeon
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.287-294
    • /
    • 2014
  • Cloud computing is a new method of computing and managing organizational information technology resources strategically. From the user perspective, it involves computing environment for accessing applications remotely, storing data, and supporting cooperative works. For the cloud computing to be effective in an organization, it should be accepted by individual users. In this paper we propose a research model, extending and modifying UTAUT model. We also test the validity of the model using the questionnaire from a sample of cloud computing services users.

Evaluating End-User Computing Capability in Total Perspective

  • Yoon, Chui-Young
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.357-362
    • /
    • 2007
  • This study presents a methodology that efficiently evaluates and interprets the end-user computing capability in a total perspective in a computing environment. The evaluation system has an evaluation tool, evaluation method and process, and an interpretation system. The validity and reliability of the developed tool construct was verified by factor and reliability analysis with the application of SPSS software. The application and utilization of the developed system was confirmed by applying it to evaluating the computing competency of 316 workers in an enterprise and presenting its evaluation results. This will contribute to developing a methodology for totally evaluating and interpreting the end-user computing capability and improving their computing capability in industrial fields.

  • PDF

Ubiquitous Computing and Statistics; What's the Connection?

  • Jun, Sung-Hae;Jorn, Hongsuk
    • Communications for Statistical Applications and Methods
    • /
    • v.11 no.2
    • /
    • pp.287-295
    • /
    • 2004
  • Mark Weiser introduced ubiquitous computing in his article titled 'The computer for 21st Century' in 1991. This has been new paradigm after internet. Now, the rapid development of mobile computer, wireless network, and intelligent system has supported ubiquitous computing environment. In the related area of information science, the researchers have studied on ubiquitous computing. But in the field of Korea statistics, this research has not been worked yet. So, we proposed the connection between statistics and ubiquitous computing in this paper. As an example, we showed an efficient cache hoarding for ubiquitous computing using statistical methods. In experimental results, we verified our proposed issue.

An Empirical Study on Factors Affecting the Assimilation of Inter-Organizational Cloud Computing and Performance and the Moderating Effect of Trust (기업 간 클라우드 컴퓨팅 동화 및 성과에 영향을 미치는 기술 및 환경 요인과 신뢰의 조절효과에 관한 연구)

  • Park, Hyunsun;Kim, Sanghyun
    • Journal of Information Technology Services
    • /
    • v.13 no.3
    • /
    • pp.1-23
    • /
    • 2014
  • This study investigates the effect of technological and environmental factors on the cloud computing assimilation, which then affects firms' performance. The technological characteristics include cost-savings, technology use advantage, technology infrastructure, and technology compatibility while environmental characteristics include partner cooperation, competitive pressure, environmental uncertainty, and business agility. Furthermore, we examine inter-organizational trust as a moderating effect between environmental characteristics and cloud computing assimilation. Data from a sample of 219 firms show the significant impacts of proposed variables with exception of technology infrastructure and technology compatibility. The findings also show that inter-organizational trust has a significant moderating effect in all paths except the one between business agility and cloud computing assimilation. The implication of this study suggests a theoretical framework explaining cloud computing assimilation and performance within inter-organizational environment.

A GPU-based point kernel gamma dose rate computing code for virtual simulation in radiation-controlled area

  • Zhihui Xu;Mengkun Li;Bowen Zou;Ming Yang
    • Nuclear Engineering and Technology
    • /
    • v.55 no.6
    • /
    • pp.1966-1973
    • /
    • 2023
  • Virtual reality technology has been widely used in the field of nuclear and radiation safety, dose rate computing in virtual environment is essential for optimizing radiation protection and planning the work in radioactive-controlled area. Because the CPU-based gamma dose rate computing takes up a large amount of time and computing power for voxelization of volumetric radioactive source, it is inefficient and limited in its applied scope. This study is to develop an efficient gamma dose rate computing code and apply into fast virtual simulation. To improve the computing efficiency of the point kernel algorithm in the reference (Li et al., 2020), we design a GPU-based computing framework for taking full advantage of computing power of virtual engine, propose a novel voxelization algorithm of volumetric radioactive source. According to the framework, we develop the GPPK(GPU-based point kernel gamma dose rate computing) code using GPU programming, to realize the fast dose rate computing in virtual world. The test results show that the GPPK code is play and plug for different scenarios of virtual simulation, has a better performance than CPU-based gamma dose rate computing code, especially on the voxelization of three-dimensional (3D) model. The accuracy of dose rates from the proposed method is in the acceptable range.

Recovery Model Improvement using BISLD in Mobile Computing Environment (모바일 컴퓨팅 환경에서 BISLD를 이용한 회복모델 개선)

  • Cho, Sung-Je;Han, Seong-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.10
    • /
    • pp.4786-4793
    • /
    • 2012
  • In a recent mobile computing environment, the research for a transaction model have been actively carried out to deal with real-time transaction. However, the research for recovery model is relatively insufficient. Therefore, it would be very important for mobile recovery methods for database stability, just in case of data loss due to hand-off in mobile computing system. So, further efficient research should be keenly done to reduce I/O hand-off in mobile computing systems. SLL method increases I/O time due to sequential file. This paper have been suggested to efficient mobile recovery method in mobile computing system. Finally, it has been clearly demonstrated for system efficiency, conducting the performance assessment that currently proposed recovery system.

Volume Rendering Architecture of Mobile Medical Image using Cloud Computing (클라우드 컴퓨팅을 활용한 모바일 의료영상 볼륨렌더링 아키텍처)

  • Lee, Woongkyu;Nam, Doohee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.101-106
    • /
    • 2014
  • The era came that by having fastest internet and smart phone makes cloud computing really a big merit. This paper proposes architecture for medical image volume rendering in mobile environment using cloud computing. This architecture to replace expensive workstation server and storage it use one of the service of cloud computing IaaS(Infrastructure as a Service). And this paper propose to use webGL to get rid of restriction of mobile hardware. By this research, it is expected that medical image volume rendering service in mobile environment is more effective and can be a foundation work.

A Study on Security of Virtualization in Cloud Computing Environment for Convergence Services (융합서비스를 위한 클라우드 컴퓨팅 환경에서 가상화 보안에 관한 연구)

  • Lee, Bo-Kyung
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.93-99
    • /
    • 2014
  • Cloud computing refers to borrow IT resources as needed by leveraging Internet technology and pay as much as you used by supporting real-time scalability depending on the service load. Virtualization which is the main technology of cloud computing is a technology that server, storage and hardware are regarded as not separate system but one system area and are allocated as needed. However, the security mechanisms provided by virtualized environments are difficult to cope with the traditional security mechanisms, having basic levels of visibility, control and audit function, on which the server is designed to monitor the traffic between the servers. In this paper, the security vulnerabilities of virtualization are analysed in the cloud computing environment and cloud virtualization security recommendations are proposed.

A Study Privacy and Security in Ubiquitous City Environment (Focous on Computing Values Analysis of Personal Information) (유비쿼터스 도시 환경에서 프라시버시 보호 방안에 관한 소고 - 경쟁하는 개인정보가치 분석을 중심으로 -)

  • Jung Chang-Duk;Kang Jang-Mook
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.249-254
    • /
    • 2006
  • As the concept of Ubiquitous City has become an important issue, we need to have a voice in the field of privacy. The Ubiquitous Computing revolution, it is achieved a physical space and an intelligent union of cyber space in the space where an off-line space was integrated with on-line. It is combined with a life space naturally, and Ubiquitous creates a new integrated space. The space is the opportunity space that is limitless as soon as it is the unknown world that mankind was not able to experience yet. According to the recent papers and studies, Privacy or Personal Information sector is mentioned as a major problem for Ubiquitous Computing Society. Therefore, this paper checks Ubiquitous City, the present privacy concept and situation of currently proceeding Ubiquitous computing environment. Also, The main purpose of this paper is to analyze the concepts privacy, personal information. Thus this paper treated the analysis of case, technological or social issue, problem and solution, competing values of privacy and so on.

  • PDF