• Title/Summary/Keyword: virtual computing systems

Search Result 211, Processing Time 0.03 seconds

Collaboration Framework based on Social Semantic Web for Cloud Systems (클라우드 시스템에서 소셜 시멘틱 웹 기반 협력 프레임 워크)

  • Mateo, Romeo Mark A.;Yang, Hyun-Ho;Lee, Jae-Wan
    • Journal of Internet Computing and Services
    • /
    • v.13 no.1
    • /
    • pp.65-74
    • /
    • 2012
  • Cloud services are used for improving business. Moreover, customer relationship management(CRM) approaches use social networking as tools to enhance services to customers. However, most cloud systems do not support the semantic structures, and because of this, vital information from social network sites is still hard to process and use for business strategy. This paper proposes a collaboration framework based on social semantic web for cloud system. The proposed framework consists of components to support social semantic web to provide an efficient collaboration system for cloud consumers and service providers. The knowledge acquisition module extracts rules from data gathered by social agents and these rules are used for collaboration and business strategy. This paper showed the implementations of processing of social network site data in the proposed semantic model and pattern extraction which was used for the virtual grouping of cloud service providers for efficient collaboration.

Design of Gateway for In-vehicle Sensor Network

  • Kim, Tae-Hwan;Lee, Seung-Il;Hong, Won-Kee
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.73-76
    • /
    • 2005
  • The advanced information and communication technology gives vehicles another role of the third digital space, merging a physical space with a virtual space in a ubiquitous society. In the ubiquitous environment, the vehicle becomes a sensor node, which has a computing and communication capability in the digital space of wired and wireless network. An intelligent vehicle information system with a remote control and diagnosis is one of the future vehicle systems that we can expect in the ubiquitous environment. However, for the intelligent vehicle system, many issues such as vehicle mobility, in-vehicle communication, service platform and network convergence should be resolved. In this paper, an in-vehicle gateway is presented for an intelligent vehicle information system to make an access to heterogeneous networks. It gives an access to the server systems on the internet via CDMA-based hierarchical module architecture. Some experiments was made to find out how long it takes to communicate between a vehicle's intelligent information system and an external server in the various environment. The results show that the average response time amounts to 776ms at fixec place, 707ms at rural area and 910ms at urban area.

  • PDF

An Adaptive Prefetching Technique for Software Distributed Shared Memory Systems (소프트웨어 분산공유메모리시스템을 위한 적응적 선인출 기법)

  • Lee, Sang-Kwon;Yun, Hee-Chul;Lee, Joon-Won;Maeng, Seung-Ryoul
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.28 no.9
    • /
    • pp.461-468
    • /
    • 2001
  • Though shared virtual memory (SVM) system promise low cost solutions for high performance computing they suffer from long memory latencies. These latencies are usually caused by repetitive invalidations on shared data. Since shared data are accessed through synchronization and the patterns by which threads synchronizes are repetitive, a prefetching scheme bases on such repetitiveness would reduce memory latencies. Based on this observation, we propose a prefetching technique which predicts future access behavior by analyzing access history per synchronization variable. Our technique was evaluated on an 8-node SVM system using the SPLASH-2 benchmark. The results show the our technique could achieve 34%~45% reduction in memory access latencies.

  • PDF

Bitcoin Cryptocurrency: Its Cryptographic Weaknesses and Remedies

  • Anindya Kumar Biswas;Mou Dasgupta
    • Asia pacific journal of information systems
    • /
    • v.30 no.1
    • /
    • pp.21-30
    • /
    • 2020
  • Bitcoin (BTC) is a type of cryptocurrency that supports transaction/payment of virtual money between BTC users without the presence of a central authority or any third party like bank. It uses some cryptographic techniques namely public- and private-keys, digital signature and cryptographic-hash functions, and they are used for making secure transactions and maintaining distributed public ledger called blockchain. In BTC system, each transaction signed by sender is broadcasted over the P2P (Peer-to-Peer) Bitcoin network and a set of such transactions collected over a period is hashed together with the previous block/other values to form a block known as candidate block, where the first block known as genesis-block was created independently. Before a candidate block to be the part of existing blockchain (chaining of blocks), a computation-intensive hard problem needs to be solved. A number of miners try to solve it and a winner earns some BTCs as inspiration. The miners have high computing and hardware resources, and they play key roles in BTC for blockchain formation. This paper mainly analyses the underlying cryptographic techniques, identifies some weaknesses and proposes their enhancements. For these, two modifications of BTC are suggested ― (i) All BTC users must use digital certificates for their authentication and (ii) Winning miner must give signature on the compressed data of a block for authentication of public blocks/blockchain.

Evaluation of Distributed Intrusion Detection System Based on MongoDB (MongoDB 기반의 분산 침입탐지시스템 성능 평가)

  • Han, HyoJoon;Kim, HyukHo;Kim, Yangwoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.12
    • /
    • pp.287-296
    • /
    • 2019
  • Due to the development and increased usage of Internet services such as IoT and cloud computing, a large number of packets are being generated on the Internet. In order to create a safe Internet environment, malicious data that may exist among these packets must be processed and detected quickly. In this paper, we apply MongoDB, which is specialized for unstructured data analysis and big data processing, to intrusion detection system for rapid processing of big data security events. In addition, building the intrusion detection system(IDS) using some of the private cloud resources which is the target of protection, elastic and dynamic reconfiguration of the IDS is made possible as the number of security events increase or decrease. In order to evaluate the performance of MongoDB - based IDS proposed in this paper, we constructed prototype systems of IDS based on MongoDB as well as existing relational database, and compared their performance. Moreover, the number of virtual machine has been increased to find out the performance change as the IDS is distributed. As a result, it is shown that the performance is improved as the number of virtual machine is increased to make IDS distributed in MongoDB environment but keeping the overall system performance unchanged. The security event input rate based on distributed MongoDB was faster as much as 60%, and distributed MongoDB-based intrusion detection rate was faster up to 100% comparing to the IDS based on relational database.

Estimation of Crop Virtual Water in Korea (한국의 농산물 가상수 산정)

  • Yoo, Seung-Hwan;Choi, Jin-Yong;Kim, Tae-Gon;Im, Jeong-Bin;Chun, Chang-Hoo
    • Journal of Korea Water Resources Association
    • /
    • v.42 no.11
    • /
    • pp.911-920
    • /
    • 2009
  • Virtual water is defined as the volume of water required to produce a commodity or service. The degree of food self-sufficiency is currently about 27 % in South Korea, so that Korea is one of the largest net virtual water import countries for agricultural product, thus it is necessary to estimate suitable virtual water for South Korea. The objective of this paper is to quantify the agricultural virtual water use (AWU) and virtual water content (VWC) using the method suggested by Chapagain and Hoekstra during the period 1991-2007. To calculate the virtual water content, 44 different crop production quantity and harvested area data were collected for 17 years and FAO Penman-Monteith equation was adapted for computing crop consumptive use of water. As the results, AWU has been estimated at 15.1 billion $m^3$ in average showing a tendency to decrease. Rice has the largest share in the AWU, consuming about 10.1 billion $m^3$/yr which is about 75 % of gross AWU, and the VWC is 1600.1 $m^3$/ton for paddy rice. The largest VWCs of crops are oilseed and tuber crop, and the smallest are leaf and root vegetables. The primary crop production VWC can be used for calculating the VWC of various secondary products using the contribution ratio, therefore the results of this study are expected to be used as basic data for national agricultural water footprint.

Design of a Programming Language and a Compiler for Test Systems (테스트 시스템을 위한 프로그래밍 언어와 컴파일러 설계)

  • Go, Hoon-Joon;Yoo, Weon-Hee
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.3
    • /
    • pp.356-365
    • /
    • 2002
  • Test systems verify and classify the various kinds of semiconductor products. So test systems need programs that can test the various special functions of hardware modules and products. Programs can be modified, compiled and executed by engineers. Consequently, the systems needs programming languages that can be easily programmed by engineers and their compilers that can compile and execute teat programs. In this paper we discuss the environment of programming languages and their compilers for the existing domestic teat systems. We design a programming language and implement its compiler that can be conveniently used by the experienced engineers in the industry field. Experimental results show that a newly designed test system with our programming language and compiler can teat products faster than the existing test system.

A Framework Using UPPAAL to Verify Schedulability of Hierarchical Scheduling Systems (계층적 실시간 시스템 스케줄링 검증을 위한 정형적 프레임워크)

  • Ahn, So Jin;Hwang, Dae Yon;Choi, Jin Young
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.9
    • /
    • pp.604-609
    • /
    • 2015
  • The use of Operating System(OS) virtualization is increasing as it provides many useful features such as efficient use of hardware(HW), easy system migration, and isolation between virtual spaces which prevents errors effecting each other. Recent development in HW has made it possible to use OS virtualization in embedded systems. However, implementing OS virtualization means that a multiple number of schedulers are layered in a system, rendering it difficult to analyze the schedulability of the system and errors are easily produced. Errors in safety critical embedded systems can cause serious damage to life and property; thus, the hierarchical schedulability must be verified. In this paper, we propose a framework which supports formal modeling and verification of hierarchical scheduling systems with UPPAAL.

Dynamic Memory Allocation for Scientific Workflows in Containers (컨테이너 환경에서의 과학 워크플로우를 위한 동적 메모리 할당)

  • Adufu, Theodora;Choi, Jieun;Kim, Yoonhee
    • Journal of KIISE
    • /
    • v.44 no.5
    • /
    • pp.439-448
    • /
    • 2017
  • The workloads of large high-performance computing (HPC) scientific applications are steadily becoming "bursty" due to variable resource demands throughout their execution life-cycles. However, the over-provisioning of virtual resources for optimal performance during execution remains a key challenge in the scheduling of scientific HPC applications. While over-provisioning of virtual resources guarantees peak performance of scientific application in virtualized environments, it results in increased amounts of idle resources that are unavailable for use by other applications. Herein, we proposed a memory resource reconfiguration approach that allows the quick release of idle memory resources for new applications in OS-level virtualized systems, based on the applications resource-usage pattern profile data. We deployed a scientific workflow application in Docker, a light-weight OS-level virtualized system. In the proposed approach, memory allocation is fine-tuned to containers at each stage of the workflows execution life-cycle. Thus, overall memory resource utilization is improved.

Efficient Software Licensing Management Strategy for Server Consolidation and Virtualization Using the N-Datacenter Case (서버통합 및 가상화를 위한 효율적인 소프트웨어 라이선싱 관리전략에 관한 연구 : N-데이터센터를 중심으로)

  • Choi, Young-Jin;Ra, Jong-Hei;Choi, Kwang-Don
    • Journal of Information Technology Services
    • /
    • v.10 no.4
    • /
    • pp.281-293
    • /
    • 2011
  • Server consolidation and virtualization have become an integral part of IT planning to reduce TCO cost and ensure the high availability for customer, enlarge the flexibility to computing resource in today' enterprise data centers. In spite of having the variety advantages of server consolidation and virtualization, they cause many problems such as the software licensing issues, virtual server sprawl, network complexity issues, hardware start-up costs, and failover costs. In particular, software licensing problem brings about the serious results in operating of data center and also presents a significant challenge to virtualization because many vendors have realized that licensing policies applicable to physical systems are not compatible with virtual machines. So, the IT planers must be considering this problem before they conducts the server consolidation and virtualization. In this paper, we proposed the efficiency strategy of SW licensing for server consolidation and virtualization analyzing the N-Datacenter case in Korea. As a result, we suggest the two strategies as technical and management/contract aspect. First, as the technical aspect, we propose i) the adaptation of suitable licensing for virtualization, ii) differentiation of license according to the characteristics of server, iii) the core distribution of licenses to minimizing. Second, as the management/contract aspect, we suggest following three things. i) The existing license agreement is changed to the right licensing for virtualization. ii) The license agreement is contracts the active focused. iii) When a new contract should be added to virtualization provisions.