• 제목/요약/키워드: one-to-one computing

검색결과 2,213건 처리시간 0.034초

A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing

  • Jing Yixin;Kim, Jin-Hyung;Jeong, Dong-Won
    • Journal of Information Processing Systems
    • /
    • 제2권1호
    • /
    • pp.28-33
    • /
    • 2006
  • The initial research of Task Computing in the ubiquitous computing (UbiComp) environment revealed the need for access control of services. Context-awareness of service requests in ubiquitous computing necessitates a well-designed model to enable effective and adaptive invocation. However, nowadays little work is being undertaken on service access control under the UbiComp environment, which makes the exposed service suffer from the problem of ill-use. One of the research focuses is how to handle the access to the resources over the network. Policy-Based Access Control is an access control method. It adopts a security policy to evaluate requests for resources but has a light-weight combination of the resources. Motivated by the problem above, we propose a universal model and an algorithm to enhance service access control in UbiComp. We detail the architecture of the model and present the access control implementation.

조선 산업에서의 유비쿼터스 기술 활용 (Ubiquitous computing Technology for Shipbuilding)

  • 이경호;김동근;박종훈;김대석
    • 한국전산구조공학회:학술대회논문집
    • /
    • 한국전산구조공학회 2007년도 정기 학술대회 논문집
    • /
    • pp.731-736
    • /
    • 2007
  • Ubiquitous computing is a model of computing in which computer functions are integrated into everyday life, providing services and information in anywhere and anytime fashion. Augmented Reality is one of ubiquitous computing technologies to provide new paradigm utilized to interact between human and computer. By adding computer-generated non-visual information to real information and their interaction. user can get the improved and more knowledgeable information about real world. The purpose of this paper is the integration of AR and knowledge-base reasoning technology in ubiquitous computing. Through the introduced concept, it is enable to provide adequate knowledge in the process of ship design and manufacturing easily (Knowledge Everywhere). That is, this is a basic research to construct knowledge-based ubiquitous environment (KAD/KAM) in shipbuilding industry.

  • PDF

가상화 기술의 취약점을 이용한 공격 대응에 관한 연구 (A Study against Attack using Virtualization Weakness)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제8권3호
    • /
    • pp.57-64
    • /
    • 2012
  • Computing environment combined with development of internet and IT technology is changing to cloud computing environment. In addition, cloud computing is revitalized more because of propagation of LTE and suggestion of N-screen Service. Virtualization is the point technology for suggest IT resource to service form to users in this cloud computing. This technology combines other system physically or divides one system logically and uses resource efficiently. Many users can be provided application and hardware as needed using this. But, lately various attack using weak point of virtualization technology are increasing rapidly. In this study, we analyze type and weak point of virtualization technology, the point of cloud computing. And we study about function and the position which intrusion detection system has to prepare in order to detect and block attack using this.

Deep Learning Based Security Model for Cloud based Task Scheduling

  • Devi, Karuppiah;Paulraj, D.;Muthusenthil, Balasubramanian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권9호
    • /
    • pp.3663-3679
    • /
    • 2020
  • Scheduling plays a dynamic role in cloud computing in generating as well as in efficient distribution of the resources of each task. The principle goal of scheduling is to limit resource starvation and to guarantee fairness among the parties using the resources. The demand for resources fluctuates dynamically hence the prearranging of resources is a challenging task. Many task-scheduling approaches have been used in the cloud-computing environment. Security in cloud computing environment is one of the core issue in distributed computing. We have designed a deep learning-based security model for scheduling tasks in cloud computing and it has been implemented using CloudSim 3.0 simulator written in Java and verification of the results from different perspectives, such as response time with and without security factors, makespan, cost, CPU utilization, I/O utilization, Memory utilization, and execution time is compared with Round Robin (RR) and Waited Round Robin (WRR) algorithms.

Resource Management Strategies in Fog Computing Environment -A Comprehensive Review

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.310-328
    • /
    • 2022
  • Internet of things (IoT) has emerged as the most popular technique that facilitates enhancing humans' quality of life. However, most time sensitive IoT applications require quick response time. So, processing these IoT applications in cloud servers may not be effective. Therefore, fog computing has emerged as a promising solution that addresses the problem of managing large data bandwidth requirements of devices and quick response time. This technology has resulted in processing a large amount of data near the data source compared to the cloud. However, efficient management of computing resources involving balancing workload, allocating resources, provisioning resources, and scheduling tasks is one primary consideration for effective computing-based solutions, specifically for time-sensitive applications. This paper provides a comprehensive review of the source management strategies considering resource limitations, heterogeneity, unpredicted traffic in the fog computing environment. It presents recent developments in the resource management field of the fog computing environment. It also presents significant management issues such as resource allocation, resource provisioning, resource scheduling, task offloading, etc. Related studies are compared indifferent mentions to provide promising directions of future research by fellow researchers in the field.

디지털 트랜스포메이션 시대의 언플러그드를 적용한 컴퓨팅 사고력에 대한 효과성 분석 (Effectiveness Analysis of Computing Thinking with Unplugged in Digital Transformation)

  • 이명숙
    • 디지털융복합연구
    • /
    • 제18권3호
    • /
    • pp.35-42
    • /
    • 2020
  • 디지털 트랜스포메이션은 가상과 현실간의 상호작용을 혁신하는 것이다. 이 과정에서 발생하는 복잡한 문제를 해결해야 하고, 그 방법 중 하나가 컴퓨팅 사고력이다. 따라서 본 연구는 대학에서 교양교육으로 언플러그드를 이용한 소프트웨어 교육이 컴퓨팅 사고력을 향상시키는데 효과가 있는지 살펴보는 것을 목표로 한다. 그 방법으로 전체 학년을 대상으로 한 교양 소프트웨어 수업에 컴퓨팅 사고 5개 요소를 추출한 후 언플러그드를 적용하여 수업을 진행하였다. 한 학기 16차시 수업을 진행하였고 설문지를 통해 컴퓨터 사고력 향상을 측정하였다. 그 결과 수업 이후 수강생의 컴퓨팅 사고력이 전반적으로 증가하였다. 관찰조사에서는 전 학문분야에서 컴퓨팅 사고력 요소 중 추상화 요소를 개념화하는데 어려움을 느꼈으며, 예·체능은 알고리즘 요소를, 인문학은 패턴인식 요소를 개념화하는데 더 어려움을 느꼈다. 향후 각 요소를 학문영역별로 다양한 내용의 콘텐츠를 개발하여 학습자에게 이해를 돕는 것이 필요하다.

A need-awaring multi-agent approach to nomadic community computing for ad hoc need identification and group formation

  • 최근호;권오병
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 2005년도 공동추계학술대회
    • /
    • pp.183-192
    • /
    • 2005
  • Recently, community computing has been proposed for group formation and group decision-making. However, legacy community computing systems do not support group need identification for ad hoc group formation, which would be one of key features of ubiquitous decision support systems and services. Hence, this paper aims to provide a multi-agent based methodology to enable nomadic community computing which supports ad hoc need identification and group formation. Focusing on supporting group decision-making of relatively small sized multiple individual in a community, the methodology copes with the following three characteristics: (1) ad hoc group formation, (2) context-aware group need identification, and (3) using mobile devices working in- and out-doors. NAMA-US, an RFID-based prototype system, has been developed to show the feasibility of the idea proposed in this paper.

  • PDF

Dynamic Task Scheduling Via Policy Iteration Scheduling Approach for Cloud Computing

  • Hu, Bin;Xie, Ning;Zhao, Tingting;Zhang, Xiaotong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권3호
    • /
    • pp.1265-1278
    • /
    • 2017
  • Dynamic task scheduling is one of the most popular research topics in the cloud computing field. The cloud scheduler dynamically provides VM resources to variable cloud tasks with different scheduling strategies in cloud computing. In this study, we utilized a valid model to describe the dynamic changes of both computing facilities (such as hardware updating) and request task queuing. We built a novel approach called Policy Iteration Scheduling (PIS) to globally optimize the independent task scheduling scheme and minimize the total execution time of priority tasks. We performed experiments with randomly generated cloud task sets and varied the performance of VM resources using Poisson distributions. The results show that PIS outperforms other popular schedulers in a typical cloud computing environment.

An Efficient Scheduling Method for Grid Systems Based on a Hierarchical Stochastic Petri Net

  • Shojafar, Mohammad;Pooranian, Zahra;Abawajy, Jemal H.;Meybodi, Mohammad Reza
    • Journal of Computing Science and Engineering
    • /
    • 제7권1호
    • /
    • pp.44-52
    • /
    • 2013
  • This paper addresses the problem of resource scheduling in a grid computing environment. One of the main goals of grid computing is to share system resources among geographically dispersed users, and schedule resource requests in an efficient manner. Grid computing resources are distributed, heterogeneous, dynamic, and autonomous, which makes resource scheduling a complex problem. This paper proposes a new approach to resource scheduling in grid computing environments, the hierarchical stochastic Petri net (HSPN). The HSPN optimizes grid resource sharing, by categorizing resource requests in three layers, where each layer has special functions for receiving subtasks from, and delivering data to, the layer above or below. We compare the HSPN performance with the Min-min and Max-min resource scheduling algorithms. Our results show that the HSPN performs better than Max-min, but slightly underperforms Min-min.

Mica2 mote를 이용한 센서 네트워크 테스트 베드 구축 (Sensor Network Test Bed Construction using mica2 mote)

  • 이윤경;박영수;전성익
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 컴퓨터소사이어티 추계학술대회논문집
    • /
    • pp.61-64
    • /
    • 2003
  • Technological progress in integrated, low-power, CMOS communication devices and sensors makes a rich design space of networked sensors viable. These sensors can be deeply embedded in the physical world and spread throughout sensor network environment like smart dust. So ubiquitous computing will be come true. SmartDust project is the one of ubiquitous computing approach. It produces TinyOS, mote(mica, mica2, rene2, mica2dot, etc.), NesC, TinyDB, etc. We constructs sensor network test bed and tests to approach sensor network and ubiquitous computing.

  • PDF