• Title/Summary/Keyword: distributed applications

Search Result 1,258, Processing Time 0.027 seconds

KubEVC-Agent : Kubernetes Edge Vision Cluster Agent for Optimal DNN Inference and Operation (KubEVC-Agent : 머신러닝 추론 엣지 컴퓨팅 클러스터 관리 자동화 시스템)

  • Moohyun Song;Kyumin Kim;Jihun Moon;Yurim Kim;Chaewon Nam;Jongbin Park;Kyungyong Lee
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.6
    • /
    • pp.293-301
    • /
    • 2023
  • With the advancement of artificial intelligence and its various use cases, accessing it through edge computing environments is gaining traction. However, due to the nature of edge computing environments, efficient management and optimization of clusters distributed in different geographical locations is considered a major challenge. To address these issues, this paper proposes a centralization and automation tool called KubEVC-Agent based on Kubernetes. KubEVC-Agent centralizes the deployment, operation, and management of edge clusters and presents a use case of the data transformation for optimizing intra-cluster communication. This paper describes the components of KubEVC-Agent, its working principle, and experimental results to verify its effectiveness.

Color Pattern Recognition and Tracking for Multi-Object Tracking in Artificial Intelligence Space (인공지능 공간상의 다중객체 구분을 위한 컬러 패턴 인식과 추적)

  • Tae-Seok Jin
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.27 no.2_2
    • /
    • pp.319-324
    • /
    • 2024
  • In this paper, the Artificial Intelligence Space(AI-Space) for human-robot interface is presented, which can enable human-computer interfacing, networked camera conferencing, industrial monitoring, service and training applications. We present a method for representing, tracking, and objects(human, robot, chair) following by fusing distributed multiple vision systems in AI-Space. The article presents the integration of color distributions into particle filtering. Particle filters provide a robust tracking framework under ambiguous conditions. We propose to track the moving objects(human, robot, chair) by generating hypotheses not in the image plane but on the top-view reconstruction of the scene.

Antecedents to Entrepreneurship Behavior: Moderating Role of Social Support and Entrepreneurial Self Efficacy among Business Students

  • Ava Shrestha;Sateesh Kumar Ojha
    • Journal of Information Technology Applications and Management
    • /
    • v.30 no.3
    • /
    • pp.15-35
    • /
    • 2023
  • Considerable agreement exists about the importance of promoting entrepreneurship in both developed and developing countries. In less developed countries, governments see entrepreneurship as a way to stimulate economic development and tackle serious economic and social challenges. So how can countries encourage young people to become entrepreneurs? Research confirms that intentions play an important role in the decision to start a new firm and many factors influence that intentions. The purpose of the study was to investigate the antecedents to entrepreneurship behavior with particular attention to moderating role of social support and entrepreneur self-efficacy. The study covered 116 business students of undergraduate and post graduate level studying under different universities in Kathmandu, Nepal. The questionnaire for data collection was distributed in college groups via WhatsApp and viber with the support and permission from the college administration. The study design used was correlational with a sampling procedure of convenience. The study only showed the impact of attitude to entrepreneurship behavior as well as moderating effect of social support was also observed.

Interactions in transversely isotropic new modified couple stress solid due to Hall current, rotation, inclined load with energy dissipation

  • Parveen Lata;Harpreet Kaur
    • Coupled systems mechanics
    • /
    • v.13 no.1
    • /
    • pp.21-41
    • /
    • 2024
  • This paper is concerned with the disturbances in a transversely isotropic new modified couple stress homogeneous thermoelastic rotating medium under the combined influence of Hall currents, magnetic fields, and mechanical sources represented by inclined loads. The application of Laplace and Fourier transform techniques are used for the derivation of analytical expressions for various physical quantities. As an application,the bounding surface is subjected to uniformly and linearly distributed force (mechanical force). Present model contains length scale parameters that can capture the size effects. Numerical inversion techniques has been used to provide insights into the system's behavior in the physical domain. The graphical representation of numerical simulated results has been presented to emphasize the impact of rotation and inclined line loads on the system, enhancing our understanding of the studied phenomena. Further research can extend this study to investigate additional complexities and real-world applications.

Research on the Application of Gamification in Fitness App Based on Kano Model

  • Jing Ren;Chang-wook Lee
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.136-148
    • /
    • 2024
  • In recent years, public attention to health and wellness issues has increased. The integration of smart fitness hardware and innovative technologies have made the development of smart fitness a trend. The number of fitness applications in the market has surged, and demand for an optimal experience is increasingly high. This study selects Sweatcoin, Home Workout, Six Pack in 30 Days, and Fitness Coach & Diet as research subjects from the top ten global mobile health and fitness apps in 2022 based on download rankings. The research is based on eight gamification elements: motivation, challenge, achievement, relationships, sharing, reward, level, and competition, identified through preliminary studies. We distributed a total of 166 questionnaires to users and collected 163 valid responses for data analysis. The Kano Model was used to study the desires of fitness enthusiasts using fitness apps. To reduce the limitations of the research results, the Better-Worse Method was employed for satisfaction index analysis. Based on the final analysis, we propose suggestions for improvement for the four fitness apps to better meet user needs and create a more attractive and efficient application experience.

MS Load Balancing Algorithm in Cloud Computing

  • Ankita Gupta;Ranu Lal Chouhan
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.157-161
    • /
    • 2024
  • Cloud computing becomes an important technology for distributed computing and parallel computing. Cloud computing provides various facility like to share resources, software packages, information, storage and many different applications depending on user demand at any time and at any place. It provides an extensive measure for computing and storage. A service provided by it to user follows pay-as-you-go model. Although it provides many facilities still there is some problem which are resource discovery, fault tolerance, load balancing, and security. Out of these Load balancing is the main challenges. There are many techniques which used to distribute wor9kload or task equally across the servers. This paper includes cloud computing, cloud computing architecture, virtualization and MS load balancing technique which provide enhanced load balancing.

SPATIOTEMPORAL EPIDEMIC MODELS FOR RABIES AMONG DOG WITH VACCINATION APPROACH

  • Adil El Alami Laaroussi;Amine EL Bhih;Mostafa Rachik
    • Nonlinear Functional Analysis and Applications
    • /
    • v.29 no.3
    • /
    • pp.711-738
    • /
    • 2024
  • This study develops an optimal control strategy for canine rabies transmission using a two-dimensional spatiotemporal model with spatial dynamics. Our objective is to minimize the number of infected and exposed individuals while reducing vaccination costs. We rigorously establish the existence of optimal control and provide a detailed characterization. Numerical simulations show that early intervention, in particular timely vaccination at the onset of an outbreak, effectively controls the disease. Our model highlights the importance of spatial factors in rabies spread and underlines the need for proactive vaccination campaigns, providing valuable insights for public health policy and intervention strategies.

Nonlinear bending analysis of bidirectional graded porous plates with elastic foundations relative to neutral surface

  • Amr E. Assie
    • Advances in aircraft and spacecraft science
    • /
    • v.11 no.2
    • /
    • pp.129-152
    • /
    • 2024
  • The applicability of a novel incremental-iterative technique with 2D differential/integral quadrature method (DIQM) in analyzing the nonlinear behavior of Bi-directional functionally graded (BDFG) porous plate based on neutral surface is verified in the present works. A formulation of four variables high shear deformation theory is used to describe the kinematic relations with respect to neutral surface rather than mid-plane. Bi-directional material distributions are presented by power functions through both thickness and axial directions. Porosities and voids are distributed by different cosine functions. The large deformations are included within the sense of nonlinear von Kármán strains. The integro-differential equilibrium equations with associated modified boundary conditions are solved numerically and iteratively by using 2D DIQM. Model validations and parametric analysis are depicted to present the influence of neutral axis, nonlinear strains, gradation indices, elastic foundations, and modified boundary conditions on the static deflection in addition to normal and shear stresses. The proposed model is effective in analyzing the static behavior of many real applications in nuclear reactors, marine and aerospace structures with large deformations.

Development of component architecture to support IoT management (IoT 및 네트워크 관리 지원을 위한 컴포넌트 아키텍처 개발)

  • Seo, Hee Kyoung
    • Smart Media Journal
    • /
    • v.6 no.2
    • /
    • pp.42-49
    • /
    • 2017
  • It is important to realize automation services by communicating in IoT with humans, objects & objects, and forming a common network. People used web like the most powerful network way to sharing things and communication. Therefore the efficiency method communication between each device and the web in IoT could be different from ones. The best method for high quality software product in web applications is software reuse ; Modules, classes, patterns, frameworks, and business components are reusable elements of various perspectives. Components is plugged with others through well-defined interfaces, which can overcome the operation and complexity of application development. A web-based distributed environment for IoT applications is a standard architecture use information collected from various devices for developing and using applications. For that reason, the network management which manages the constituent resources for the best service control in IoT application is required as a sub-layer support service in most applications as well as individual applications. In this paper, we measure to develop a network management system based not only by components but on heterogeneous internetworks. For procedure this, we clarify a component architecture for classifying and classify also the component needed in the IOT and network domain or order the type of real network management system.

Design and Implementation of a Transparent Security Infrastructure using Filter and Transformer (필터와 트랜스포머를 이용한 투명한 보안기반의 설계 및 구현)

  • Kim, Yong-Min;Lee, Do-Heon;Noh, Bong-Nam;Choi, Rak-Man;Ine, So-Ran
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.4
    • /
    • pp.975-983
    • /
    • 1998
  • In these days, information communication systems are based on both open distributed computing technologies and object-oriented techniques like inheritance, encapsulation and object reuse to support various system configuration and application. As information systems are interconnected through unsecure networks, the need for the secure information exchange is more critical than before. In this paper, we have designed and implemented a transparent CORBA-basce Security infrastructure with authentication, security context association, access control and security information management to support a secure applications in distributed object environment. SESAME Ver. 4 was adopted as an external security service to manage user privilege attributes and to distribute keys for data encryption, decryption and integrity. Using filter and transformer with an interface to Object Request Broker, it provides a transparent security service to applications. The filter objects are special classes that allow additional parameters to be inserted into messages before they are sent and removed just after they are received. The transformer objects are special classes that allow direct access to the byte stream of every messages for encryption and decryption before it is sent and just after it is received. This study is to implement the access control interceptor(ACI) and the secure invocation interceptor(SII) of secure ORB defined in CORBA using filter and transformer.

  • PDF