• Title/Summary/Keyword: computing model

Search Result 3,371, Processing Time 0.029 seconds

Grid Scheduling Model with Resource Performance Measurement in Computational Grid Computing (계산 그리드 컴퓨팅에서의 자원 성능 측정을 통한 그리드 스케줄링 모델)

  • Park, Da-Hye;Lee, Jong-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.87-94
    • /
    • 2006
  • Grid computing has been developed for resolving large-scaled computing problems through geographically distributed heterogeneous resources. In order to guarantee effective and reliable job processing, grid computing needs resource scheduling model. So, we propose a resource performance measurement scheduling model which allocates job to resources with resource performance measurement. We assess resources using resource performance measurement formula, and implement the resource performance measurement scheduling model in DEVS simulation modeling.

  • PDF

A Study on the Performance of Parallelepiped Classification Algorithm (평행사변형 분류 알고리즘의 성능에 대한 연구)

  • Yong, Whan-Ki
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.4 no.4
    • /
    • pp.1-7
    • /
    • 2001
  • Remotely sensed data is the most fundamental data in acquiring the GIS informations, and may be analyzed to extract useful thematic information. Multi-spectral classification is one of the most often used methods of information extraction. The actual multi-spectral classification may be performed using either supervised or unsupervised approaches. This paper analyze the effect of assigning clever initial values to image classes on the performance of parallelepiped classification algorithm, which is one of the supervised classification algorithms. First, we investigate the effect on serial computing model, then expand it on MIMD(Multiple Instruction Multiple Data) parallel computing model. On serial computing model, the performance of the parallel pipe algorithm improved 2.4 times at most and, on MIMD parallel computing model the performance improved about 2.5 times as clever initial values are assigned to image class. Through computer simulation we find that initial values of image class greatly affect the performance of parallelepiped classification algorithms, and it can be improved greatly when classes on both serial computing model and MIMD parallel computation model.

  • PDF

A Model to Investigate the Security Challenges and Vulnerabilities of Cloud Computing Services in Wireless Networks

  • Desta Dana Data
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.107-114
    • /
    • 2023
  • The study provides the identification of vulnerabilities in the security issues by Wireless Network. To achieve it the research focus on packet flow analysis, end to end data communication, and the security challenges (Cybercrime, insider threat, attackers, hactivist, malware and Ransomware). To solve this I have used the systematic literature review mechanisms and demonstrative tool namely Wireshark network analyzer. The practical demonstration identifies the packet flow, packet length time, data flow statistics, end- to- end packet flow, reached and lost packets in the network and input/output packet statics graphs. Then, I have developed the proposed model that used to secure the Wireless network solution and prevention vulnerabilities of the network security challenges. And applying the model that used to investigate the security challenges and vulnerabilities of cloud computing services is used to fulfill the network security goals in Wireless network. Finally the research provides the model that investigate the security challenges and vulnerabilities of cloud computing services in wireless networks

UCQM: A Quality Model for Practical Evaluation of Ubiquitous Computing Systems (유비쿼터스 컴퓨팅 시스템의 실용적 품질 평가 모델)

  • Oh, Sang-Hun;Kim, Soo-Dong;Rhew, Sung-Yul
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.4
    • /
    • pp.342-358
    • /
    • 2007
  • Ubiquitous Computing System (UCS) is a system where the user can get information through computer network anytime and anywhere regardless of the places. Since UCS is a personalized system, it should interact with other systems. UCS will bring a remarkable change in production, consumption, politics, economy, community, culture, and other areas related to our daily life. That is, a high-quality UCS results in high-quality services provided to users. Hence, this paper proposes a systematic quality model based on ISO/lEC 9126 in order to evaluate the ubiquitous computing system, based on ISO/lEC 9126. And, we identify key characteristics of UCS and derive the set of quality attributes based on identified characteristics. We define metrics for each quality attribute and Ubiquitous Computing Quality Model CUCQM) so that we can evaluate overall environment and important characteristics of UCS.

An Efficient Deep Learning Based Image Recognition Service System Using AWS Lambda Serverless Computing Technology (AWS Lambda Serverless Computing 기술을 활용한 효율적인 딥러닝 기반 이미지 인식 서비스 시스템)

  • Lee, Hyunchul;Lee, Sungmin;Kim, Kangseok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.6
    • /
    • pp.177-186
    • /
    • 2020
  • Recent advances in deep learning technology have improved image recognition performance in the field of computer vision, and serverless computing is emerging as the next generation cloud computing technology for event-based cloud application development and services. Attempts to use deep learning and serverless computing technology to increase the number of real-world image recognition services are increasing. Therefore, this paper describes how to develop an efficient deep learning based image recognition service system using serverless computing technology. The proposed system suggests a method that can serve large neural network model to users at low cost by using AWS Lambda Server based on serverless computing. We also show that we can effectively build a serverless computing system that uses a large neural network model by addressing the shortcomings of AWS Lambda Server, cold start time and capacity limitation. Through experiments, we confirmed that the proposed system, using AWS Lambda Serverless Computing technology, is efficient for servicing large neural network models by solving processing time and capacity limitations as well as cost reduction.

The Effective Factors of Cloud Computing Adoption Success in Organization

  • Yoo, Seok-Keun;Kim, Bo-Young
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.6 no.1
    • /
    • pp.217-229
    • /
    • 2019
  • The purpose of the research is to verify how task characteristics for business and technology characteristics, economic feasibility, technology readiness, organizational factors, environmental factors of cloud computing affect the performance of cloud computing adoption through Fit and Viability. The research aims to verify the relationship among the success factors for adopting cloud computing based on the Fit-Viability model. Respondents who work for IT companies which is using cloud computing in South Korea were chosen. The data was analyzed by the structural equating model. As a result, Task characteristics and Technology characteristics affected Fit in a positive manner, while Technology readiness, Organizational factors and Environmental factors also positively impacted Viability. Fit and Viability both affected the successful adoption of cloud equally. In particular, Environmental factors were proven to have the biggest impacts on Viability, and affected highly indirect impact on the Performance of cloud computing adoption through Viability. Entering the era of the fourth industrial revolution, corporations have established digital transformation strategies to secure a competitive edge while growing continuously, and are also carrying out various digital transformation initiatives. For the success of adoption of foundational technologies, they need to understand not only the decision-making factors of adopting cloud computing, but also the success factors of adopting cloud computing.

Applying Ubi-SERVQUAL to Assessing the Quality of Ubiquitous Service Scenarios (Ubi-SERVQUAL을 활용한 시나리오상의 유비쿼터스 서비스 품질 평가)

  • Kwon, Oh-Byung;Kim, Ji-Hoon
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.32 no.1
    • /
    • pp.1-13
    • /
    • 2007
  • Nowadays, ubiquitous computing services begin to be suggested from a few domains such as supply chain, logistics, and location-based services. However, to what extent the services will be successful is hard to be estimated, mainly because a sophisticated service evaluation method focusing on the ubiquitous computing perspective has not been supplied. Hence, this paper alms to build a model to assess the quality of ubiquitous computing service. To do so, an amended model, Ubi-SERVQUAL, is applied to assess the service quality mentioned in ubiquitous computing scenarios. According to the Ubi-SERVQUAL, we found that an actual service with higher quality should consider reliability. responsiveness, assurance and empathy in order to increase customer satisfaction, computer system's intimacy with users and trust.

Task Scheduling and Resource Management Strategy for Edge Cloud Computing Using Improved Genetic Algorithm

  • Xiuye Yin;Liyong Chen
    • Journal of Information Processing Systems
    • /
    • v.19 no.4
    • /
    • pp.450-464
    • /
    • 2023
  • To address the problems of large system overhead and low timeliness when dealing with task scheduling in mobile edge cloud computing, a task scheduling and resource management strategy for edge cloud computing based on an improved genetic algorithm was proposed. First, a user task scheduling system model based on edge cloud computing was constructed using the Shannon theorem, including calculation, communication, and network models. In addition, a multi-objective optimization model, including delay and energy consumption, was constructed to minimize the sum of two weights. Finally, the selection, crossover, and mutation operations of the genetic algorithm were improved using the best reservation selection algorithm and normal distribution crossover operator. Furthermore, an improved legacy algorithm was selected to deal with the multi-objective problem and acquire the optimal solution, that is, the best computing task scheduling scheme. The experimental analysis of the proposed strategy based on the MATLAB simulation platform shows that its energy loss does not exceed 50 J, and the time delay is 23.2 ms, which are better than those of other comparison strategies.

ACCESS CONTROL MODEL FOR DATA STORED ON CLOUD COMPUTING

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Rehan, Akmal;Mumtaz, Imran;Ahmad, Wasi
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.208-221
    • /
    • 2019
  • The inference for this research was concentrated on client's data protection in cloud computing i.e. data storages protection problems and how to limit unauthenticated access to info by developing access control model then accessible preparations were introduce after that an access control model was recommend. Cloud computing might refer as technology base on internet, having share, adaptable authority that might be utilized as organization by clients. Compositely cloud computing is software's and hardware's are conveying by internet as a service. It is a remarkable technology get well known because of minimal efforts, adaptability and versatility according to client's necessity. Regardless its prevalence large administration, propositions are reluctant to proceed onward cloud computing because of protection problems, particularly client's info protection. Management have communicated worries overs info protection as their classified and delicate info should be put away by specialist management at any areas all around. Several access models were accessible, yet those models do not satisfy the protection obligations as per services producers and cloud is always under assaults of hackers and data integrity, accessibility and protection were traded off. This research presented a model keep in aspect the requirement of services producers that upgrading the info protection in items of integrity, accessibility and security. The developed model helped the reluctant clients to effectively choosing to move on cloud while considerate the uncertainty related with cloud computing.

Factors Affecting User Acceptance of Ubiquitous Computing based on Mobile Services (모바일 서비스에 기반한 유비쿼터스 컴퓨팅의 사용자 수용에 영향을 미치는 요인)

  • No, Mi-Jin;Kim, Byung-Gon;Park, Soon-Chang
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.1
    • /
    • pp.55-74
    • /
    • 2011
  • The growth in the use of ubiquitous computing based on mobile services as an enabler to conduct business more effectively has been phenomenal. Technology acceptance model (TAM) has been applied in different contexts to examine a wide range of information technologies (IT). As more and more companies are finding ways to utilize ubiquitous computing based on mobile services, an important issue is to understand what factors will impact the decisions of consumers in adopting the services. Based on TAM with three additional groups of external factors, i.e., service-related factors (ubiquitous access, context awareness) and technology-related factors (perceived security risk, network connectivity) that are theoretically justified as having influence on both perceived usefulness and perceived ease of use which are additionally considered, a research model for the investigated technology acceptance was developed and empirically examined, using responses from more than intended users of ubiquitous computing based on mobile services. The specific purposes of this study are as follows. Firstly, this study is to identify service beliefs considering unique characteristics for ubiquitous services such as perceived ubiquitous access and perceived context awareness. Secondly, this study is to investigate network characteristics beliefs such as perceived security and perceived connectivity. Thirdly, this paper investigates the relationship among variables such as ubiquitous characteristics, network characteristics, behavioral beliefs, and intention to use ubiquitous web services. This study uses a structural equation model to test the research model. The major results of this study are as follows. Firstly, ubiquitous access has a influence on perceived usefulness and perceived ease of use. Context awareness has an influence on perceived usefulness. Secondly, User familiarity has an influence on perceived usefulness and perceived ease of use, and intention to use. User innovativeness has an influence on perceived ease of use. Thirdly, perceived security risk has an influence on perceived usefulness and perceived ease of use. Network connectivity has an influence on perceived usefulness and perceived ease of use. Fourth, there exist differential effects among factors in structural model among information, transaction, and entertainment services.