- Cloud Computing and Resource Management
- Distributed and Parallel Computing Systems
- IoT and Edge/Fog Computing
- Service-Oriented Architecture and Web Services
- Peer-to-Peer Network Technologies
- Software System Performance and Reliability
- Caching and Content Delivery
- Advanced Data Storage Technologies
- Cloud Data Security Solutions
- Business Process Modeling and Analysis
- Adaptive Control of Nonlinear Systems
- Parallel Computing and Optimization Techniques
- Simulation Techniques and Applications
- Real-time simulation and control systems
- Scientific Computing and Data Management
- Mobile Ad Hoc Networks
- Data Management and Algorithms
- Robotic Path Planning Algorithms
- Embedded Systems Design Techniques
- Traffic Prediction and Management Techniques
- Energy Efficient Wireless Sensor Networks
- Technology and Data Analysis
- Blockchain Technology Applications and Security
- Real-Time Systems Scheduling
- Vehicular Ad Hoc Networks (VANETs)
Kookmin University
2015-2024
Catholic Kwandong University
2015
Konkuk University
2008
Korea Telecom (South Korea)
2008
Handong Global University
2003-2004
Michigan State University
1992-2002
The computational world is becoming very large and complex. Cloud Computing has emerged as a popular computing model to support processing volumetric data using clusters of commodity computers. According J.Dean S. Ghemawat [1], Google currently processes over 20 terabytes raw Web data. It's some fascinating, large-scale that makes your head spin appreciate the years distributed fine-tuning applied today's problems. evolution cloud can handle such massive per on demand service. Nowadays...
SUMMARY Cloud computing has emerged as a popular milieu that provides range of delivering solutions for small to large enterprises with flexible model allows power and storing space the volumetric data within minimum cost. These days, computational paradigm is shifting towards utility‐based pay‐as‐you‐go many discussion aside, but there remains no canonical definition cloud yet. In this paper we have proposed service‐oriented taxonomical spectrum computing, which more focused on service...
Modeling a cloud computing center is crucial to evaluate and predict its inner connectivity reliability availability. Many previous studies on system availability/reliability assessment of virtualized systems consisting singular servers in data centers have been reported. In this paper, we propose hierarchical modeling framework for the availability evaluation tree-based networks. The model consists three layers, including 1) graphs top layer network topology; 2) fault-tree architecture...
Rising aggressive virus pandemics urge to conduct studies on dependability and security of modern computing systems secure autonomous continuous operations healthcare systems. In that regard, we propose quantify measures an Internet-of-Medical Things (IoMT) infrastructure relied integrated physical architecture cloud/fog/edge (CFE) paradigms in this article. We a reliability/availability quantification methodology for the IoMT using hierarchical model three levels: 1) fault tree (FT) overall...
Applications that process large volumes of data (such as, search engines, grid computing applications, mining etc.) require a backend infrastructure for storing data. The distributed file system is the central component infrastructure. There have been many projects focused on network designed and implemented systems with variety architectures functionalities. In this paper, we develop comprehensive taxonomy describing use to survey existing implementations in very large-scale such as Grids,...
It is necessary to develop a vehicle digital twin (DT) for urban air mobility (UAM) that uses an accurate, physics-based emulator model the statics and dynamics of vehicle. This because use twins in operation control UAM vehicles essential operational infrastructure (UAM-ODT). There are several issues need be addressed this process: (i) lack engines digitalization (twinization) at core UAM-ODT systems; (ii) back-end system engineering development DTs; (iii) fault-tolerant mechanisms DT cloud...
The aggressive waves of ongoing world-wide virus pandemics urge us to conduct further studies on the performability local computing infrastructures at hospitals/medical centers provide a high level assurance and trustworthiness medical services treatment patients, help diminish burden chaos management operations. Previous contributed tremendous progress dependability quantification existing paradigms (e.g., cloud, grid computing) remote data centers, while few works investigated performance...
Cloud computing has been widely adopted over the years by practitioners and companies with a variety of requirements. With strong economic appeal, cloud makes possible idea as utility, in which resources can be consumed paid for same convenience electricity. One main characteristics service is elasticity supported auto-scaling capabilities. The mechanism allows adjusting to meet multiple demands dynamically. best represented critical web trading transaction systems that must satisfy certain...
Information technology is moving towards the next generation and attaining a new paradigm shift with development of technologies its impact application are inevitable. In particular, focus on Web services (Web 2.0) increasing currently it been considered as platform rather than service, due to capability data integration working jointly other applications. This has helped enterprise have dimension their development. Similarly, social networking playing crucial role provides organizations...
Modeling a complete Internet of Things (IoT) infrastructure is crucial to assess its availability and security characteristics. However, modern IoT infrastructures often consist complex heterogeneous architecture thus taking into account both operative details the in monolithic model challenge for system practitioners developers. In that regard, we propose hierarchical modeling framework quantification this paper. The methodology based on three levels including (i) reliability block diagram...
Cloud computing emerges as a paradigm that facilitates on-demand access to technological resources through the mechanism of service virtualization.This virtualization enables partitioning hardware among applications are organized into distinct independent modules.The concept microservice architecture takes advantage capabilities embrace software strategy focused on development assemblies several interdependent but loosely coupled modules.Nonetheless, adoption microservices is accompanied by...
The domain of information security is undergoing significant evolution to address the increasingly complex challenges aimed at bolstering system resilience against attacks. Moving Target Defense (MTD) methodology, which entails altering system's configuration—for instance, by relocating virtual machines (VM) or modifying IP addresses—serves dynamically modify vulnerable components a system. This strategy effectively disorients potential attackers, complicating their efforts comprehend...
Enterprise Service Bus (ESB) provides a layer on top of an implementation enterprise messaging system. The ESB highly distributed, event-driven Oriented Architecture (SOA) that combines Message Middleware (MOM), Web services,intelligent routing based content, and XML data transformation. transmits receives standard set messages. When it message, routes to the appropriate application. Content-based intelligent supports service selection composition. However, current software can only support...
Swarm Intelligence (SI) is an AI technique that has the collective behavior of a decentralized, self-organized system. SI more advantages such as scalability, adaptability, robustness and individual simplicity also ability to solve complex problems. Besides, algorithms have few issues in time-critical applications, parameter tuning, stagnation. need be studied overcome these kinds issues. In this paper, we popular detail identify important control parameters randomized distribution. We...
Text document clustering refers to the unsupervised classification of textual documents into clusters based on content similarity and can be applied in applications such as search optimization extracting hidden information from data generated by IoT sensors. Swarm intelligence (SI) algorithms use stochastic heuristic principles that include simple unintelligent individuals follow some rules accomplish very complex tasks. By mapping features problems parameters SI algorithms, achieve...
In the rapidly evolving urban advanced mobility (UAM) sphere, Vehicular Ad Hoc Networks (VANETs) are crucial for robust communication and operational efficiency in future environments. This paper quantifies VANETs to improve their reliability availability, essential integrating UAM into infrastructures. It proposes a novel Stochastic Petri Nets (SPN) method evaluating VANET-based Vehicle Communication Control (VCC) architectures, given dynamic demands of UAM. The SPN model, incorporating...
Cloud computing has emerged as a popular model to support processing volumetric data using clusters of commodity computers. Nowadays computational world is opting for pay-for-use models and hype discussion aside, there remains no canonical definition cloud computing. In this paper we proposed wide spectrum taxonomy computing, aiming at better understanding the categories applications that could benefit from cloudification will address landscape enterprise IT, management services, governance etc.
This paper is about one more method for the hand gesture recognition algorithms. Described system in this doesn't require wearing any device or gloves subject's hand. For detecting motion, simple stereo camera needed. The actual difference of suggested with previous works we are using grayscale histogram to define depth threshold calculated disparity map.
In recent years, container-based virtualization technology for edge and cloud computing has advanced dramatically. Virtualization solutions based on Docker Containers provide a more lightweight efficient virtual environment Edge cloud-based applications. Because their use is growing its own still in early phases, these technologies will face slew of security issues. Vulnerabilities malware container images are two serious concerns. The risk privilege escalation increased because containers...
Abstract Accurate classification of images is essential for the analysis mammograms in computer aided diagnosis breast cancer. We propose a new approach to classify mammogram based on fractal features. Given image, we first eliminate all artifacts and extract salient features such as Fractal Dimension (FD) Signature (FS). These provide good descriptive values region. Second, trainable multilayer feed forward neural network has been designed purposes compared test results with K-Means. The...
본 연구는 성별에 따른 인터넷 중독의 차이, 중독수준에 우울, 불안, 충동성, 공격성 같은 심리특성의 차이를 규명하고자 했다. 또한 심리특성, 중독과 자아탄력성 간의 상관을 검증하고, 심리특성과 중독과의 관계에 있어 자아탄력성이 조절변인으로 기능하는지 검증하고자 하였다. 이 연구를 위해 전북지역의 5개 학교에 재학 중인 529명의 대학생들(남: 212명, 여: 317명)을 대상으로 사용시간, 사용동기, 공격성, 중독, 등의 설문조사를 실시하고 자료를 수집하였다. 연구의 주요한 연구결과는 다음과 같다. 첫째, 남자대학생이 여자대학생에 비해 중독 수준이 높았으며, 중독수준이 높을수록 우울과 충동성이 높았다. 둘째, 충동성 자아탄력성은 정적 상관이 있었다. 셋째, 남성의 경우 불안과 충동성이, 여성의 중독이나 과다사용을 증가시키는 부정적 영향이 넷째, 여자대학생의 기능하는 경향이 검증되었다. 과다사용에 대한 효과적인 개입을 위해서는 우울감소와 충동조절 능력의 증진 이외에...
Compared to the traditional data storing, processing, analyzing and visualization which have been performed, Big requires evolutionary technologies of massive processing on distributed parallel systems, such as Hadoop system. analytic thus, popular derive important decision making in various areas. However, system faces limitation due huge amount data. This brings necessity interactive techniques beyond static visualization. R has used improved for a big analysis mining tool. Also, is...