• Title/Summary/Keyword: computing model

Search Result 3,371, Processing Time 0.027 seconds

A Study on the Risk Index Model of Work Type in Architectural Construction Work (건축공사 공종별 위험지수 산정모델에 관한 연구)

  • Chang, Seong-Rok;Go, Seong-Seok;Lee, Jong-Bin
    • Journal of the Korean Society of Safety
    • /
    • v.22 no.6
    • /
    • pp.63-68
    • /
    • 2007
  • The purpose of this study is to verify the relation between the risk index using AHP(Analytic Hierarchy Process) and the risk index using Computing Model. For doing the objective, this research classified 22 work types in architectural construction work from the analysis Korean architectural standard specification and Korea occupational safety & health agency code. Based on the classified 22 work types in architectural construction work, the risk index of each work type was calculated by AHP and Computing Model. For verifying the correlation of risk index between AHP and Computing Model methods, SAS version 8.0 System, which is one of the statistics programs, was used.

Probability-annotated Ontology Model for Context Awareness in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서의 상황 인식을 위한 확률 확장 온톨로지 모델)

  • Jung, Heon-Man;Lee, Jung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.239-248
    • /
    • 2006
  • Current context-aware applications In ubiquitous computing environments make the assumption that the context they are dealing with is correct. However, in reality, both sensed and interpreted context informations are often uncertain or imperfect. In this paper, we propose a probability extension model to ontology-based model for rep resenting uncertain contexts and use Bayesian networks to resolve about uncertainty of context informations. The proposed model can support the development and operation of various context-aware services, which are required in the ubiquitous computing environment.

  • PDF

An Offloading Scheduling Strategy with Minimized Power Overhead for Internet of Vehicles Based on Mobile Edge Computing

  • He, Bo;Li, Tianzhang
    • Journal of Information Processing Systems
    • /
    • v.17 no.3
    • /
    • pp.489-504
    • /
    • 2021
  • By distributing computing tasks among devices at the edge of networks, edge computing uses virtualization, distributed computing and parallel computing technologies to enable users dynamically obtain computing power, storage space and other services as needed. Applying edge computing architectures to Internet of Vehicles can effectively alleviate the contradiction among the large amount of computing, low delayed vehicle applications, and the limited and uneven resource distribution of vehicles. In this paper, a predictive offloading strategy based on the MEC load state is proposed, which not only considers reducing the delay of calculation results by the RSU multi-hop backhaul, but also reduces the queuing time of tasks at MEC servers. Firstly, the delay factor and the energy consumption factor are introduced according to the characteristics of tasks, and the cost of local execution and offloading to MEC servers for execution are defined. Then, from the perspective of vehicles, the delay preference factor and the energy consumption preference factor are introduced to define the cost of executing a computing task for another computing task. Furthermore, a mathematical optimization model for minimizing the power overhead is constructed with the constraints of time delay and power consumption. Additionally, the simulated annealing algorithm is utilized to solve the optimization model. The simulation results show that this strategy can effectively reduce the system power consumption by shortening the task execution delay. Finally, we can choose whether to offload computing tasks to MEC server for execution according to the size of two costs. This strategy not only meets the requirements of time delay and energy consumption, but also ensures the lowest cost.

Performance analysis of local exit for distributed deep neural networks over cloud and edge computing

  • Lee, Changsik;Hong, Seungwoo;Hong, Sungback;Kim, Taeyeon
    • ETRI Journal
    • /
    • v.42 no.5
    • /
    • pp.658-668
    • /
    • 2020
  • In edge computing, most procedures, including data collection, data processing, and service provision, are handled at edge nodes and not in the central cloud. This decreases the processing burden on the central cloud, enabling fast responses to end-device service requests in addition to reducing bandwidth consumption. However, edge nodes have restricted computing, storage, and energy resources to support computation-intensive tasks such as processing deep neural network (DNN) inference. In this study, we analyze the effect of models with single and multiple local exits on DNN inference in an edge-computing environment. Our test results show that a single-exit model performs better with respect to the number of local exited samples, inference accuracy, and inference latency than a multi-exit model at all exit points. These results signify that higher accuracy can be achieved with less computation when a single-exit model is adopted. In edge computing infrastructure, it is therefore more efficient to adopt a DNN model with only one or a few exit points to provide a fast and reliable inference service.

Development of the Conceptual Model of Constructing and Operating the Integrated Computing Environment (통합전산환경 구축$\cdot$운영을 위한 개념적 모형 개발)

  • Jung, Hae-Yong;Kim, Sang-Hoon
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.4
    • /
    • pp.173-195
    • /
    • 2005
  • As the amount of informatization investment is rapidly increasing in many organizations, it becomes more inevitable to manage computing resources (information systems, computing facilities and manpower etc.) effectively. Specially, in public sector It is thought to be very important to achieve the economy of scale by integrating computing resources which are managed individually in many agencies. Also, our government have been recently making much efforts to raise the effectiveness of operating the information systems by promoting joint information use among many public agencies, enhancing the operating systems and the expertise of IS staff and applying the optimal information security systems. This study focuses on presenting the framework to effectively integrate omputing resources and proposing the ways of constructing and operating the integrated computing environment for the institutions and the affiliated groups under the Ministry of Culture & Tourism which are in charge of implementing cultural informatization. The main implications of this study are 1) building the ideal model of the integrated computing environment architecture suitable to cultural informatization area, 2) showing the criteria of deciding whether the organizations use the Integrated computing environment or not and how extensively they commit their computing resources to it, and 3) suggesting the ways of the phased integration and the change management to minimize confusion in the process of adopting the integrated computing environment and behavioral problems such as conflict and resistance of IS-related Personnel Influenced by Implementing the integrated computing environment.

  • PDF

The Study on the Status and Development of International Ubiquitous Computing (유비쿼터스 컴퓨팅의 실태와 발전에 관한 연구)

  • Kim Kyung-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.221-231
    • /
    • 2004
  • Ubiquitous computing is not radical as Mark Weiser argues and includes things. The status of each nation is as follows. Project of America or Europe are practice for computing infra. intelligence of things and space and man-computer co-relation study, otherwise Japan centers the studying of network ubiquity utilizing computing competence. In this thesis I analyzed real status on the ubiquitous computing case study of each nation. and I proposed computing development model. factor, structured value system. five type business and technology model.

  • PDF

Deep Learning Based Security Model for Cloud based Task Scheduling

  • Devi, Karuppiah;Paulraj, D.;Muthusenthil, Balasubramanian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3663-3679
    • /
    • 2020
  • Scheduling plays a dynamic role in cloud computing in generating as well as in efficient distribution of the resources of each task. The principle goal of scheduling is to limit resource starvation and to guarantee fairness among the parties using the resources. The demand for resources fluctuates dynamically hence the prearranging of resources is a challenging task. Many task-scheduling approaches have been used in the cloud-computing environment. Security in cloud computing environment is one of the core issue in distributed computing. We have designed a deep learning-based security model for scheduling tasks in cloud computing and it has been implemented using CloudSim 3.0 simulator written in Java and verification of the results from different perspectives, such as response time with and without security factors, makespan, cost, CPU utilization, I/O utilization, Memory utilization, and execution time is compared with Round Robin (RR) and Waited Round Robin (WRR) algorithms.

A New Approach to Web Data Mining Based on Cloud Computing

  • Zhu, Wenzheng;Lee, Changhoon
    • Journal of Computing Science and Engineering
    • /
    • v.8 no.4
    • /
    • pp.181-186
    • /
    • 2014
  • Web data mining aims at discovering useful knowledge from various Web resources. There is a growing trend among companies, organizations, and individuals alike of gathering information through Web data mining to utilize that information in their best interest. In science, cloud computing is a synonym for distributed computing over a network; cloud computing relies on the sharing of resources to achieve coherence and economies of scale, similar to a utility over a network, and means the ability to run a program or application on many connected computers at the same time. In this paper, we propose a new system framework based on the Hadoop platform to realize the collection of useful information of Web resources. The system framework is based on the Map/Reduce programming model of cloud computing. We propose a new data mining algorithm to be used in this system framework. Finally, we prove the feasibility of this approach by simulation experiment.

Requirements Analysis for Access Control Model on Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서의 접근제어 모델을 위한 요구사항 분석)

  • Oh Sejong;Park Jeho
    • The KIPS Transactions:PartA
    • /
    • v.11A no.7 s.91
    • /
    • pp.563-570
    • /
    • 2004
  • Ubiquitous computing environment requires strong security and privacy. Access control is one of security areas. Access control on Ubiquitous computing is different from it on traditional information systems so that traditional access control models are not suitable for Ubiquitous comput-ing environment. This research defines Ubiquitous computing environment as an access control point of view, and shows requirements to consid-er for developing access control model for Ubiquitous computing environment. It also brings up three implementing types of access control on Ubiquitous computing environment.

A Study on Influencing Factors on User's Adoption Resistance to Personal Cloud Computing Service (개인용 클라우드 컴퓨팅 서비스 수용저항에 영향을 미치는 요인에 관한 연구)

  • Jo, In-Jea;Kim, Sun-Kyu;Yang, Sung-Byung
    • Knowledge Management Research
    • /
    • v.16 no.1
    • /
    • pp.117-142
    • /
    • 2015
  • Recently, the personal cloud computing service has been being spotlighted as an individual tool of productivity enhancement. However, compared to the rosy forecast, its diffusion rate in the domestic (Korean) market is much slower than expected. In order to find the reason for the slow growth of personal cloud computing service, we attempt to identify influencing factors on user's adoption resistance, while most prior research has focused on the factors affecting its adoption. Based on both the person-technology fit model and the privacy calculus model, we propose technostress and perceived value as key antecedents of adoption resistance. In addition, we identify (1) technical (pace of change and complexity) and personal (self-efficacy) influencing factors on technostress, and (2) beneficial (perceived mobility and perceived availability) and harmful (perceived vulnerability) influencing factors on perceived value. To validate our research model, 133 individual samples were gathered from undergraduate and graduate students who had actual experience of using at least one of personal cloud computing services. The results of the structural equation modeling confirm that both technostress and perceived value have significant effects on adoption resistance, but they have different influencing mechanisms to different types of adoption resistance (indifference, postponement, and rejection). Theoretical and practical contributions are discussed in the conclusion.