• Title/Summary/Keyword: computing environment

Search Result 3,249, Processing Time 0.03 seconds

A STUDY ON THE EFFICIENCY OF AERODYNAMIC DESIGN OPTIMIZATION USING DISTRIBUTED COMPUTATION (분산컴퓨팅 환경에서 공력 설계최적화의 효율성 연구)

  • Kim Y.-J.;Jung H.-J.;Kim T.-S.;Joh C.-Y.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2005.10a
    • /
    • pp.163-167
    • /
    • 2005
  • A research to evaluate efficiency of design optimization was performed for aerodynamic design optimization problem in distributed computing environment. The aerodynamic analyses which take most of computational work during design optimization were divided into several jobs and allocated to associated PC clients through network. This is not a parallel process based on domain decomposition rather than a simultaneous distributed-analyses process using network-distributed computers. GBOM(gradient-based optimization method), SAO(Sequential Approximate Optimization) and RSM(Response Surface Method) were implemented to perform design optimization of transonic airfoil and to evaluate their efficiencies. One dimensional minimization followed by direction search involved in the GBOM was found an obstacle against improving efficiency of the design process in distributed computing environment. The SAO was found quite suitable for the distributed computing environment even it has a handicap of local search. The RSM is apparently the fittest for distributed computing environment, but additional trial and error works needed to enhance the reliability of the approximation model are annoying and time-consuming so that they often impair the automatic capability of design optimization and also deteriorate efficiency from the practical point of view.

  • PDF

A Study on the RFID Security Technologies in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 RFID보안 기술에 대한 연구)

  • Bang Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.6 no.4
    • /
    • pp.267-272
    • /
    • 2005
  • The ubiquitous computing environment is a new paradigm that represents the future life and is expected to bring about great changes in IT and in the lives of individuals. However, since a good deal of information can be easily obtained and shared in the ubiquitous computing environment, problems such as a security threat and infringement of privacy are getting serious. The present study is intended to explore some ways to minimize such problems by introducing RFID technology in the ubiquitous computing environment. This study also examines the causes of violation of security and privacy that might occur in the RFID system and requirement for security. In addition it seeks possible technical solutions to those causes.

  • PDF

Prediction Method about Power Consumption by Using Utilization Rate of Resources in Cloud Computing Environment (클라우드 컴퓨팅 환경에서 자원의 사용률을 이용한 소비전력 예측 방안)

  • Park, Sang-myeon;Mun, Young-song
    • Journal of Internet Computing and Services
    • /
    • v.17 no.1
    • /
    • pp.7-14
    • /
    • 2016
  • Recently, as cloud computing technologies are developed, it enable to work anytime and anywhere by smart phone and computer. Also, cloud computing technologies are suited to reduce costs of maintaining IT infrastructure and initial investment, so cloud computing has been developed. As demand about cloud computing has risen sharply, problems of power consumption are occurred to maintain the environment of data center. To solve the problem, first of all, power consumption has been measured. Although using power meter to measure power consumption obtain accurate power consumption, extra cost is incurred. Thus, we propose prediction method about power consumption without power meter. To proving accuracy about proposed method, we perform CPU and Hard disk test on cloud computing environment. During the tests, we obtain both predictive value by proposed method and actual value by power meter, and we calculate error rate. As a result, error rate of predictive value and actual value shows about 4.22% in CPU test and about 8.51% in Hard disk test.

A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing

  • Jing Yixin;Kim, Jin-Hyung;Jeong, Dong-Won
    • Journal of Information Processing Systems
    • /
    • v.2 no.1
    • /
    • pp.28-33
    • /
    • 2006
  • The initial research of Task Computing in the ubiquitous computing (UbiComp) environment revealed the need for access control of services. Context-awareness of service requests in ubiquitous computing necessitates a well-designed model to enable effective and adaptive invocation. However, nowadays little work is being undertaken on service access control under the UbiComp environment, which makes the exposed service suffer from the problem of ill-use. One of the research focuses is how to handle the access to the resources over the network. Policy-Based Access Control is an access control method. It adopts a security policy to evaluate requests for resources but has a light-weight combination of the resources. Motivated by the problem above, we propose a universal model and an algorithm to enhance service access control in UbiComp. We detail the architecture of the model and present the access control implementation.

Design and Prototyping of Partial Connection Manager for Mobile Computing Service (이동 컴퓨팅 서비스를 위한 부분 연결 관리자의 설계 및 프로토타입핑)

  • Kim, Pyeong-Jung;Yun, Seok-Hwan;Jin, Seong-Il
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.6
    • /
    • pp.1932-1940
    • /
    • 2000
  • We must solve problems caused by mobile computing environments for supporting efficient mobile computing services. The problem is the use of wireless medium having high error rates and low bandwidth, and the sudden network disconnection to reduce the power consumption of a mobile host and the cost of the network connection. For these problems, we proposed the architecture of the partial connection manager and designed and implemented that in this paper. In particular, The partial connection manager creates the limited number of mobile agents according to priority and sends them in parallel to server systems and combines results of them process rapidly the user request. By applying the proposed partial connection manager to the mobile computing services called cybermarket, we knew that the mobile agent technique could be suited to the mobile computing environment and overcome the partial connection problem caused by eh mobile computing environment.

  • PDF

Development of Digital Contents to Improve Computational Thinking

  • Ryu, Mi-Young;Han, Sun-Gwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.12
    • /
    • pp.87-93
    • /
    • 2017
  • The purpose of this study is to design and develop of digital contents to improve computational thinking in the online education environment. First, we planned the design and development of contents with 19 experts of Software education. Digital content was designed from the point of view of improving the educational quality and the quality of contents for the improve of computing thinking. The content type is classified into the SW education area; computer science, programming, physical computing, convergent computing, computing thinking, and software education that improves the computing thinking. And we designed 45 learning programs for each SW education area. Designed learning contents were developed in 464 lessons to suit the online education environment. The content validity of the proposed content was verified by the expert group and the average CVI value was over .83. Through this, we could analyze that the developed contents will help learners to expand their computing thinking.

A Study against Attack using Virtualization Weakness (가상화 기술의 취약점을 이용한 공격 대응에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.57-64
    • /
    • 2012
  • Computing environment combined with development of internet and IT technology is changing to cloud computing environment. In addition, cloud computing is revitalized more because of propagation of LTE and suggestion of N-screen Service. Virtualization is the point technology for suggest IT resource to service form to users in this cloud computing. This technology combines other system physically or divides one system logically and uses resource efficiently. Many users can be provided application and hardware as needed using this. But, lately various attack using weak point of virtualization technology are increasing rapidly. In this study, we analyze type and weak point of virtualization technology, the point of cloud computing. And we study about function and the position which intrusion detection system has to prepare in order to detect and block attack using this.

RDP: A storage-tier-aware Robust Data Placement strategy for Hadoop in a Cloud-based Heterogeneous Environment

  • Muhammad Faseeh Qureshi, Nawab;Shin, Dong Ryeol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4063-4086
    • /
    • 2016
  • Cloud computing is a robust technology, which facilitate to resolve many parallel distributed computing issues in the modern Big Data environment. Hadoop is an ecosystem, which process large data-sets in distributed computing environment. The HDFS is a filesystem of Hadoop, which process data blocks to the cluster nodes. The data block placement has become a bottleneck to overall performance in a Hadoop cluster. The current placement policy assumes that, all Datanodes have equal computing capacity to process data blocks. This computing capacity includes availability of same storage media and same processing performances of a node. As a result, Hadoop cluster performance gets effected with unbalanced workloads, inefficient storage-tier, network traffic congestion and HDFS integrity issues. This paper proposes a storage-tier-aware Robust Data Placement (RDP) scheme, which systematically resolves unbalanced workloads, reduces network congestion to an optimal state, utilizes storage-tier in a useful manner and minimizes the HDFS integrity issues. The experimental results show that the proposed approach reduced unbalanced workload issue to 72%. Moreover, the presented approach resolve storage-tier compatibility problem to 81% by predicting storage for block jobs and improved overall data block placement by 78% through pre-calculated computing capacity allocations and execution of map files over respective Namenode and Datanodes.

A Study on the Distribute Authentication Method Scheme through Authentication and Right Mechanism Trend of the Ubiquitous Environment (유비쿼터스 환경의 인증 및 권한 메커니즘 동향을 통한 분산 인증기법 방안 연구)

  • Oh, Dong-Yeol;Sung, Kyung-Sang;Kim, Bae-Hyun;Oh, Hae-Seok
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.35-42
    • /
    • 2008
  • While an information system and administration for an application that a user contacts with raise a head by an important problem, a system approach and methodology for administration are mentioned. Authentication technology of various configuration is used, but non-efficiency by complicated authentication administration and operation inappropriate use are for a successful expansion of various and new business of wire/wireless environment. In addition, under the mobile computer environment with different authentic method each other, it is difficult at all to expect flexible and continuous service. Under the ubiquitous computing environment, It is very important thing plan to research and develop compatibility and the side of variance authentication plan that preservation characteristics are helped. Hereby, This paper look around an requirement items and authority mechanism for the administration and the operation mechanism of the distributed authentication considering expansion possibility of the ubiquitous computing environment not only fixed computing environment but also mobile computing. In future, we expect it by can guide positive participation about distributed authentication technique of the genuine ubiquitous environment.

  • PDF

A Formal Model of Coordination for Supporting Community Computing in a Ubiquitous Environment (유비쿼터스 환경에서 커뮤니티 컴퓨팅 지원을 위한 코디네이터 개발)

  • Nam, Jin-Gyu;Kim, Hyun-Woo;Shin, Dong-Min;Park, Jae-Il;Hur, Sun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.31 no.3
    • /
    • pp.43-51
    • /
    • 2008
  • Recent advances in mobile computing technologies and platform-independent information systems have enabled to realize a ubiquitous environment. Community computing has been developed as a useful tool for realizing collaborative services in a ubiquitous environment. In this paper, we present a formal model of a ubiquitous space that takes community concept into consideration and propose two management frameworks that prevent conflicts among communities. To demonstrate the validity of the proposed frameworks, an example for coordinating two communities is provided.