• Title/Summary/Keyword: Computing methodologies

Search Result 109, Processing Time 0.028 seconds

Performances of Multidisciplinary Design Optimization Methodologies in Parallel Computing Environment (다분야통합최적설계 방법론의 병렬처리 성능 분석)

  • Ahn, Moon-Youl;Lee, Se-J.
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.31 no.12
    • /
    • pp.1150-1156
    • /
    • 2007
  • Multidisciplinary design optimization methodologies play an essential role in modern engineering design which involves many inter-related disciplines. These methodologies usually require very long computing time and design tasks are hard to finish within a specified design cycle time. Parallel processing can be effectively utilized to reduce the computing time. The research on the parallel computing performance of MDO methodologies has been just begun and developing. This study investigates performances of MDF, IDF, SAND and CO among MDO methodologies in view of parallel computing. Finally, the best out of four methodologies is suggested for parallel processing purpose.

Trends in Standardization for Intelligent Computing (지능형 컴퓨팅 표준화 동향)

  • J.H. Hong;K.C. Lee
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.4
    • /
    • pp.70-80
    • /
    • 2023
  • In recent years, our society has shifted from an information society to an intelligent information society, in which computing has become a key factor in shaping and driving social development. In this new era of digital civilization powered by the Internet of Things, traditional data-based computing is no longer sufficient to meet the growing demand for higher levels of intelligence. Therefore, intelligent computing has emerged, reshaping traditional computing and forming new computing paradigms to promote the digital revolution in the era of the Internet of Things, big data, and artificial intelligence. Intelligent computing has greatly expanded the scope of computing through new computing theories, architectures, methodologies, systems, and applications, and it is expanding into diverse computing paradigms such as perceptual intelligence, cognitive intelligence, autonomous intelligence, and human-computer fusion intelligence. This paper introduces the concept and main features of intelligent computing and describes trends in standardization for intelligent computing within the ISO/IEC JTC 1, focusing on the technical trend report on intelligent computing that is currently under development within ISO/ IEC JTC 1/AG 2.

A Survey-based Analysis of Agile Adoption on Performances of IT Organizations

  • Ghani, Imran;Bello, Mannir;Bagiwa, Idris Lawal
    • Journal of Internet Computing and Services
    • /
    • v.16 no.5
    • /
    • pp.87-92
    • /
    • 2015
  • Numerous IT organizations and companies around the world aspire to improve the efficiency and general standard of their software development. The IT organizations want to seize the opportunities and take advantages of new development processes and methodologies. These advantages include higher customers' satisfaction and better software quality among many. In order to achieve them, different agile software methodologies such as scrum, Feature driven development, eXtremeProgramming (XP), Dynamic system development method, Kanban and others have been frequently adopted by IT organizations across the world. Several studies have shown that agile software development methods are effective in a lot of settings. This study, in which 40 agile practitioners from Malaysia participated, additionally confirms the effectiveness of agile development methods. Furthermore, this paper presents some of the critical barriers not well-known by IT-organizations. The results of this analysis can be used to guide IT organization from the obstacles they may face while adopting agile in their environments.

Building Hybrid Stop-Words Technique with Normalization for Pre-Processing Arabic Text

  • Atwan, Jaffar
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.65-74
    • /
    • 2022
  • In natural language processing, commonly used words such as prepositions are referred to as stop-words; they have no inherent meaning and are therefore ignored in indexing and retrieval tasks. The removal of stop-words from Arabic text has a significant impact in terms of reducing the size of a cor- pus text, which leads to an improvement in the effectiveness and performance of Arabic-language processing systems. This study investigated the effectiveness of applying a stop-word lists elimination with normalization as a preprocessing step. The idea was to merge statistical method with the linguistic method to attain the best efficacy, and comparing the effects of this two-pronged approach in reducing corpus size for Ara- bic natural language processing systems. Three stop-word lists were considered: an Arabic Text Lookup Stop-list, Frequency- based Stop-list using Zipf's law, and Combined Stop-list. An experiment was conducted using a selected file from the Arabic Newswire data set. In the experiment, the size of the cor- pus was compared after removing the words contained in each list. The results showed that the best reduction in size was achieved by using the Combined Stop-list with normalization, with a word count reduction of 452930 and a compression rate of 30%.

Vision and Research Challenges of the Next Generation Knowledge Management Systems : A Pervasive Computing Technology Perspective (편재형 컴퓨팅 기술을 적용한 차세대형 지식경영시스템의 비전과 연구 이슈)

  • Yoo, Keedong;Kwon, Ohbyung
    • Knowledge Management Research
    • /
    • v.10 no.1
    • /
    • pp.1-15
    • /
    • 2009
  • As pervasive computing technology, which aims to get linked to useful knowledge, information or services anytime, anywhere, using any devices and/or artifacts, is proliferating, desirable impacts on knowledge management systems are now available. The pervasive computing technology will potentially enable the knowledge management systems to realize individualization and socialization and ultimately increase the knowledge processing productivity. However, researchers who apply the pervasive computing methodologies to novel way of knowledge management have been very few. These result in unsatisfactory consideration of establishing pervasive knowledge management systems. Hence, the purpose of this paper is to cast the vision of pervasive knowledge management and search for a couple of possible research issues and possibilities. This paper suggests a framework of ubiDSS, an amended knowledge management system for the next generation deploying pervasive and autonomous knowledge acquisition capabilities of ubiquitous computing technologies. Also the CKAM, context-based knowledge acquisition module, is illustrated as a prototype of future knowledge management systems.

  • PDF

A MBASE-based Development Method for Ubiquitous Computing Systems (MBASE를 적용한 유비쿼터스 컴퓨팅 시스템 개발 방법론)

  • Kim, Sangsoo;Lee, Donghyun;In, Hoh
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.1 no.2
    • /
    • pp.5-11
    • /
    • 2005
  • Ubiquitous computing is an emerging technic for various areas such as public, private (individual), military, industrial, medical sectors. The applications of ubiquitous computing are expected to be prevailed from home to office. Unfortunately, it is not effective to apply existing system/software development methodologies into this emerging ubiquitous computing applications. In this paper, MBASE (Model-Based system Architecting and Software Engineering) is applied as a development method of ubiquitous computing applications. The advantage of MBASE is to identify mismatches of product, process, property, and success models and resolve them in developing the ubiquitous computing applications. A SmartView, a ubiquitous computing application, is presented as a case study o f MBASE.

  • PDF

e-Biz Component from UML, EJB & CORBA

  • Jang, Yeun-Sae
    • Proceedings of the CALSEC Conference
    • /
    • 2001.02a
    • /
    • pp.545-560
    • /
    • 2001
  • Agenda ■ Modeling S/W Components ■ Methods of how to implement a Component ■ History of Web Computing ■ e-Biz. frame wok using EJB ■ Legacy Integration Modeling S/W Components ■ Simple components ■ Component assembly-plugging ■ Processes & Methodologies. (omitted)

  • PDF

A Study on effective risk analysis and evaluation method of cloud computing system environment (클라우드컴퓨팅 시스템 환경의 효과적 위험분석평가 방법에 관한 연구)

  • Lee, Junglimg;Chang, Hangbae
    • Journal of Platform Technology
    • /
    • v.9 no.2
    • /
    • pp.10-25
    • /
    • 2021
  • Although many studies have been conducted on risk analysis and evaluation in the on-premises environment in information security, studies on effective methodologies of risk analysis and evaluation for cloud computing systems are lacking. In 2015, the Cloud Computing Development Act was enacted, which served as an opportunity to promote the introduction of cloud computing. However, due to the increase in security incidents in the cloud computing system, activation is insufficient. In addition, the cloud computing system is not being actively introduced because of the difficulty in understanding the cloud computing system technology of the person in charge who intends to introduce the cloud computing system. In this regard, this study presented an effective risk analysis and evaluation method by examining the characteristics, concepts, and models of cloud computing systems and analyzing how these characteristics affect risk analysis and evaluation.

A Methodology of Optimal Technology Combination Selection for Developing a Specific Ubiquitous Smart Space (특정 유비쿼터스 지능공간 구축을 위한 기술조합에 대한 최적 선정 방법론)

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.3
    • /
    • pp.109-131
    • /
    • 2008
  • Ubiquitous Smart Space(USS) like u-City has been expected to create a high added value. However, developing USS has a high risk because it should use future technologies and development methodologies that have been never tried in the past. Hence, it has to be considered thoroughly in the very first stage of development. Moreover, USS usually uses several ubiquitous computing technologies combinationally because of the nature of USS. Despite of this, existing technology selection methodologies or technology evaluation methodologies only focus on a single technology. This leads us to develop a methodology of optimal technology combination for developing a specific USS. The purpose of this paper is to propose the methodology and to apply it to develop a real USS. We use portfolio theory and constraint satisfaction problem to determine an optimal technology combination. We also apply our methodology to the national ubiquitous computing project which carries out at present to validate it.

  • PDF

SDRE controller considering Multi Observer applied to nonlinear IPMC model

  • Bernat, Jakub;Kolota, Jakub;Stepien, Slawomir
    • Smart Structures and Systems
    • /
    • v.20 no.1
    • /
    • pp.1-10
    • /
    • 2017
  • Ionic Polymer Metal Composite (IPMC) is an electroactive polymer (EAP) and a promising candidate actuator for various potential applications mainly due to its flexible, low voltage/power requirements, small and compact design, and lack of moving parts. Although widely used in industry, this material requires accurate numerical models and knowledge of optimal control methods. This paper presents State-Dependent Riccati Equation (SDRE) approach as one of rapidly emerging methodologies for designing nonlinear controllers. Additionally, the present paper describes a novel method of Multi HGO Observer design. In the proposed design, the calculated position of the IPMC strip accurately tracks the target position, which is illustrated by the experiments. Numerical results and comparison with experimental data are presented and the effectiveness of the proposed control strategy is verified in experiments.