• Title/Summary/Keyword: Cloud ITS

Search Result 640, Processing Time 0.024 seconds

Implementation of CUDA-based Octree Algorithm for Efficient Search for LiDAR Point Cloud (라이다 점군의 효율적 검색을 위한 CUDA 기반 옥트리 알고리듬 구현)

  • Kim, Hyung-Woo;Lee, Yang-Won
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.6_1
    • /
    • pp.1009-1024
    • /
    • 2018
  • With the increased use of LiDAR (Light Detection and Ranging) that can obtain over millions of point dataset, methodologies for efficient search and dimensionality reduction for the point cloud became a crucial technique. The existing octree-based "parametric algorithm" has proved its efficiency and contributed as a part of PCL (Point Cloud Library). However, the implementation of the algorithm on GPU (Graphics Processing Unit) is considered very difficult because of structural constraints of the octree implemented in PCL. In this paper, we present a method for the parametric algorithm on GPU environment and implement a projection of the queried points on four directions with an improved noise reduction.

Palliates the Attack by Hacker of Android Application through UID and Antimalware Cloud Computing

  • Zamani, Abu Sarwar;Ahmad, Sultan;Uddin, Mohammed Yousuf;Ansari, Asrar Ahmad;Akhtar, Shagufta
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.182-186
    • /
    • 2021
  • The market for smart phones has been booming in the past few years. There are now over 400,000 applications on the Android market. Over 10 billion Android applications have been downloaded from the Android market. Due to the Android popularity, there are now a large number of malicious vendors targeting the platform. Many honest end users are being successfully hacked on a regular basis. In this work, a cloud based reputation security model has been proposed as a solution which greatly mitigates the malicious attacks targeting the Android market. Our security solution takes advantage of the fact that each application in the android platform is assigned a unique user id (UID). Our solution stores the reputation of Android applications in an anti-malware providers' cloud (AM Cloud). The experimental results witness that the proposed model could well identify the reputation index of a given application and hence its potential of being risky or not.

An Appraoch for Preserving Loaction Privacy using Location Based Services in Mobile Cloud Computing

  • Abbas, Fizza;Hussain, Rasheed;Son, Junggab;Oh, Heekuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.621-624
    • /
    • 2013
  • Mobile Cloud Computing is today's emerging technology. Customers enjoy the services and application from this combination of mobile technology and cloud computing. Beside all these benefits it also increases the concerns regarding privacy of users, while interacting with this new paradigm One of the services is Location based services, but to get their required services user has to give his/her current location to the LBS provider that is violation of location privacy of mobile client. Many approaches are in literature for preserve location privacy but some has computation restriction and some suffer from lack of privacy. In this paper we proposed a novel idea that not only efficient in its protocol but also completely preserves the user's privacy. The result shows that by sharing just service name and a large enough geographic area (e.g. a city) user gets required information from the server by doing little client side processing We perform experiments at client side by developing and testing an android based mobile client application to support our argument.

IoT-Based Health Big-Data Process Technologies: A Survey

  • Yoo, Hyun;Park, Roy C.;Chung, Kyungyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.974-992
    • /
    • 2021
  • Recently, the healthcare field has undergone rapid changes owing to the accumulation of health big data and the development of machine learning. Data mining research in the field of healthcare has different characteristics from those of other data analyses, such as the structural complexity of the medical data, requirement for medical expertise, and security of personal medical information. Various methods have been implemented to address these issues, including the machine learning model and cloud platform. However, the machine learning model presents the problem of opaque result interpretation, and the cloud platform requires more in-depth research on security and efficiency. To address these issues, this paper presents a recent technology for Internet-of-Things-based (IoT-based) health big data processing. We present a cloud-based IoT health platform and health big data processing technology that reduces the medical data management costs and enhances safety. We also present a data mining technology for health-risk prediction, which is the core of healthcare. Finally, we propose a study using explainable artificial intelligence that enhances the reliability and transparency of the decision-making system, which is called the black box model owing to its lack of transparency.

A Fast Correspondence Matching for Iterative Closest Point Algorithm (ICP 계산속도 향상을 위한 빠른 Correspondence 매칭 방법)

  • Shin, Gunhee;Choi, Jaehee;Kim, Kwangki
    • The Journal of Korea Robotics Society
    • /
    • v.17 no.3
    • /
    • pp.373-380
    • /
    • 2022
  • This paper considers a method of fast correspondence matching for iterative closest point (ICP) algorithm. In robotics, the ICP algorithm and its variants have been widely used for pose estimation by finding the translation and rotation that best align two point clouds. In computational perspectives, the main difficulty is to find the correspondence point on the reference point cloud to each observed point. Jump-table-based correspondence matching is one of the methods for reducing computation time. This paper proposes a method that corrects errors in an existing jump-table-based correspondence matching algorithm. The criterion activating the use of jump-table is modified so that the correspondence matching can be applied to the situations, such as point-cloud registration problems with highly curved surfaces, for which the existing correspondence-matching method is non-applicable. For demonstration, both hardware and simulation experiments are performed. In a hardware experiment using Hokuyo-10LX LiDAR sensor, our new algorithm shows 100% correspondence matching accuracy and 88% decrease in computation time. Using the F1TENTH simulator, the proposed algorithm is tested for an autonomous driving scenario with 2D range-bearing point cloud data and also shows 100% correspondence matching accuracy.

Development of the Cultural Product Design Contents for High Value Added Strategy of Temple Stay as National Brand Project - Based on cloud-shaped gong among the Bulgeonsamul - (국가 브랜드 사업으로서 템플스테이 고부가가치 전략을 위한 문화상품 디자인콘텐츠 개발 - 불전사물 중 운판을 중심으로 -)

  • Kim, Sun Young
    • Journal of the Korean Society of Costume
    • /
    • v.63 no.4
    • /
    • pp.30-43
    • /
    • 2013
  • This study provides suggestions of cultural product design contents by using the cloud-shaped gong in traditional temple culture in order to find a high value-added approach. The research herein is part of cultural design contents projects embedded with the spiritual value and symbolic connotation of temple culture. This would be meaningful to enhance its degree of utilization. This can also be a way to find a strategic alternative to a high value addition of temple stay and dissemination of temple culture. For the research methodology, literature was reviewed over temple stay and Bulgeonsamul. For motive design and development of cultural product design, both Adobe Illustrator CS3 and Adobe Photoshop CS3 were used as computer design program. The template image of cloud-shaped gong for basic motive design was selected from those available at the domestic temples for accurate depiction of its head and body. Finally, samples were adopted from those temples of Gounsa, Songgwangsa, Guinsa, Hwaeomsa, and Naesosa. For each motive, different colors were applied and ten basic motives were practiced in total. By repeating the process for these motives, three types of textile design were prepared. T-shirt designs used a round neckline as basic form, and it was designed for sleeved and sleeveless styles. Apron designs stressed V-neckline and two types were processed: one for the back seam line and the other for side seam line. Pendants were designed with modern and luxurious image so that so that it could be used in various types of accessories. Designs for the bedding applied pattern design of the motives and this was done in a way that gave the images a sense of stability and splendor.

3D Library Platform Construction using Drone Images and its Application to Kangwha Dolmen (드론 촬영 영상을 활용한 3D 라이브러리 플랫폼 구축 및 강화지석묘에의 적용)

  • Kim, Kyoung-Ho;Kim, Min-Jung;Lee, Jeongjin
    • Cartoon and Animation Studies
    • /
    • s.48
    • /
    • pp.199-215
    • /
    • 2017
  • Recently, a drone is used for the general purpose application although the drone was builtfor the military purpose. A drone is actively used for the creation of contents, and an image acquisition. In this paper, we develop a 3D library module platform using 3D mesh model data, which is generated by a drone image and its point cloud. First, a lot of 2D image data are taken by a drone, and a point cloud data is generated from 2D drone images. A 3D mesh data is acquired from point cloud data. Then, we develop a service library platform using a transformed 3D data for multi-purpose uses. Our platform with 3D data can minimize the cost and time of contents creation for special effects during the production of a movie, drama, or documentary. Our platform can contribute the creation of experts for the digital contents production in the field of a realistic media, a special image, and exhibitions.

A 2-Tier Server Architecture for Real-time Multiple Rendering (실시간 다중 렌더링을 위한 이중 서버 구조)

  • Lim, Choong-Gyoo
    • Journal of Korea Game Society
    • /
    • v.12 no.4
    • /
    • pp.13-22
    • /
    • 2012
  • The wide-spread use of the broadband Internet service makes the cloud computing-based gaming service possible. A game program is executed on a cloud node and its live image is fed into a remote user's display device via video streaming. The user's input is immediately transmitted and applied to the game. The minimization of the time to process remote user's input and transmit the live image back to the user and thus satisfying the requirement of instant responsiveness for gaming makes it possible. However, the cost to build its servers can be very expensive to provide high quality 3D games because a general purpose graphics system that cloud nodes are likely to have for the service supports a single 3D application at a time. Thus, the server must have a technology of 'realtime multiple rendering' to execute multiple 3D games simultaneously. This paper proposes a new architecture of 2-tier servers of clouds nodes of which one group executes multiple games and the other produces game's live images. It also performs a few experimentations to prove the feasibility of the new architecture.

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud

  • Song, Eun-Ha;Kim, Hyun-Woo;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.347-358
    • /
    • 2012
  • Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.

Conversion Method of 3D Point Cloud to Depth Image and Its Hardware Implementation (3차원 점군데이터의 깊이 영상 변환 방법 및 하드웨어 구현)

  • Jang, Kyounghoon;Jo, Gippeum;Kim, Geun-Jun;Kang, Bongsoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2443-2450
    • /
    • 2014
  • In the motion recognition system using depth image, the depth image is converted to the real world formed 3D point cloud data for efficient algorithm apply. And then, output depth image is converted by the projective world after algorithm apply. However, when coordinate conversion, rounding error and data loss by applied algorithm are occurred. In this paper, when convert 3D point cloud data to depth image, we proposed efficient conversion method and its hardware implementation without rounding error and data loss according image size change. The proposed system make progress using the OpenCV and the window program, and we test a system using the Kinect in real time. In addition, designed using Verilog-HDL and verified through the Zynq-7000 FPGA Board of Xilinx.