• Title/Summary/Keyword: Cloud Networks

Search Result 259, Processing Time 0.03 seconds

Real-time transmission of 3G point cloud data based on cGANs (cGANs 기반 3D 포인트 클라우드 데이터의 실시간 전송 기법)

  • Shin, Kwang-Seong;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1482-1484
    • /
    • 2019
  • We present a method for transmitting 3D object information in real time in a telepresence system. Three-dimensional object information consists of a large amount of point cloud data, which requires high performance computing power and ultra-wideband network transmission environment to process and transmit such a large amount of data in real time. In this paper, multiple users can transmit object motion and facial expression information in real time even in small network bands by using GANs (Generative Adversarial Networks), a non-supervised learning machine learning algorithm, for real-time transmission of 3D point cloud data. In particular, we propose the creation of an object similar to the original using only the feature information of 3D objects using conditional GANs.

DDoS attacks prevention in cloud computing through Transport Control protocol TCP using Round-Trip-Time RTT

  • Alibrahim, Thikra S;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.276-282
    • /
    • 2022
  • One of the most essential foundations upon which big institutions rely in delivering cloud computing and hosting services, as well as other kinds of multiple digital services, is the security of infrastructures for digital and information services throughout the world. Distributed denial-of-service (DDoS) assaults are one of the most common types of threats to networks and data centers. Denial of service attacks of all types operates on the premise of flooding the target with a massive volume of requests and data until it reaches a size bigger than the target's energy, at which point it collapses or goes out of service. where it takes advantage of a flaw in the Transport Control Protocol's transmitting and receiving (3-way Handshake) (TCP). The current study's major focus is on an architecture that stops DDoS attacks assaults by producing code for DDoS attacks using a cloud controller and calculating Round-Tripe Time (RTT).

Implementation of Location Tracking Sensor Network Using M2M Technology & Cloud Services (M2M 기술과 상용 클라우드 서비스를 이용한 위치추적 센서 네트워크 구현)

  • Kim, Kyung-Shin;Kang, Moon-Sik
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.9
    • /
    • pp.93-102
    • /
    • 2014
  • Sensor networks are utilized in various fields as the useful system that provides the useful information to the user, by storing, processing and analyzing the various data collected from sensors. In construction of such sensor networks, by utilizing cloud PaaS for both communication server and the database server, the cost reduction and stabilization of the system can be achieved. In this paper, UDIPSN (User Decision Information Providing Sensor Network) was implemented to provide the decision information to the users by being treated as a cloud service for the location information of a moving object as well as various sensor data. Finally, we showed that the operation of the proposed system was performed properly.

A Route Selection Scheme for WLAN Offloading with Cloud Server in EPC Network (Cloud 서버를 포함한 EPC 망에서 WLAN 오프로딩 경로 선택 방안)

  • Kim, Su-hyun;Min, Sang-won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.603-606
    • /
    • 2013
  • Mobile and wireless communication technologies to the development of a variety of next-generation mobile networks such as smart phones, tablet PC and mobile terminals will coexist various access networks. In a variety of network service continuity and quality of service degradation due to network conditions, and the EPC network traffic overload phenomenon still remains a problem. In this paper, the EPC network traffic overload in distributed cloud servers is proposed to select. Our proposed scheme using an efficient network handover can provide optimal service according to the network condition.

  • PDF

A Reinforcement Learning Framework for Autonomous Cell Activation and Customized Energy-Efficient Resource Allocation in C-RANs

  • Sun, Guolin;Boateng, Gordon Owusu;Huang, Hu;Jiang, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.3821-3841
    • /
    • 2019
  • Cloud radio access networks (C-RANs) have been regarded in recent times as a promising concept in future 5G technologies where all DSP processors are moved into a central base band unit (BBU) pool in the cloud, and distributed remote radio heads (RRHs) compress and forward received radio signals from mobile users to the BBUs through radio links. In such dynamic environment, automatic decision-making approaches, such as artificial intelligence based deep reinforcement learning (DRL), become imperative in designing new solutions. In this paper, we propose a generic framework of autonomous cell activation and customized physical resource allocation schemes for energy consumption and QoS optimization in wireless networks. We formulate the problem as fractional power control with bandwidth adaptation and full power control and bandwidth allocation models and set up a Q-learning model to satisfy the QoS requirements of users and to achieve low energy consumption with the minimum number of active RRHs under varying traffic demand and network densities. Extensive simulations are conducted to show the effectiveness of our proposed solution compared to existing schemes.

A Study on Random Reconstruction Method of 3-D Objects Based on Conditional Generative Adversarial Networks (cGANs) (cGANs(Conditional Generative Adversarial Networks) 기반 3차원 객체의 임의 재생 기법 연구)

  • Shin, Kwang-Seong;Shin, Seong-Yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.157-159
    • /
    • 2019
  • Hologram technology has been actively developed in terms of generation, transmission, and reproduction of 3D objects, but it is currently in a state of rest because of various limitations. Beyond VR and AR, the pseudo-hologram market is growing at an intermediate stage to meet the needs of new technologies. The key to the technology of hologram is to generate vast 3 dimensional data in the form of a point cloud, transmit the vast amount of data through the communication network in real time, and reproduce it like the original at the destination. In this paper, we propose a method to transmit massive 3 - D data in real - time and transmit the minutiae points of 3 - dimensional object information to reproduce the object as similar to original.

  • PDF

Business Collaborative System Based on Social Network Using MOXMDR-DAI+

  • Lee, Jong-Sub;Moon, Seok-Jae
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.223-230
    • /
    • 2020
  • Companies have made an investment of cost and time to optimize processing of a new business model in a cloud environment, applying collaboration technology utilizing business processes in a social network. The collaborative processing method changed from traditional BPM to the cloud and a mobile cloud environment. We proposed a collaborative system for operating processes in social networks using MOXMDR-DAI+ (eXtended Metadata Registry-Data Access & Integration based multimedia ontology). The system operating cloud-based collaborative processes in application of MOXMDR-DAI+, which was suitable for data interoperation. MOXMDR-DAI+ applied to this system was an agent effectively supporting access and integration between multimedia content metadata schema and instance, which were necessary for data interoperation, of individual local system in the cloud environment, operating collaborative processes in the social network. In operating the social network-based collaborative processes, there occurred heterogeneousness such as schema structure and semantic collision due to queries in the processes and unit conversion between instances. It aimed to solve the occurrence of heterogeneousness in the process of metadata mapping using MOXMDR-DAI+ in the system. The system proposed in this study can visualize business processes. And it makes it easier to operate the collaboration process through mobile support. Real-time status monitoring of the operation process is possible through the dashboard, and it is possible to perform a collaborative process through expert search using a community in a social network environment.

An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services

  • Irshad, Azeem;Sher, Muhammad;Ahmad, Hafiz Farooq;Alzahrani, Bander A.;Chaudhry, Shehzad Ashraf;Kumar, Rahul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5529-5552
    • /
    • 2016
  • Mobile cloud computing (MCC) has revolutionized the way in which the services can be obtained from the cloud service providers. Manifold increase in the number of mobile devices and subscribers in MCC has further enhanced the need of an efficient and robust authentication solution. Earlier, the subscribers could get cloud-computing services from the cloud service providers only after having consulted the trusted third party. Recently, Tsai and Lo has proposed a multi-server authenticated key agreement solution for MCC based on bilinear pairing, to eliminate the trusted third party for mutual authentication. The scheme has been novel as far as the minimization of trusted party involvement in authenticating the user and service provider, is concerned. However, the Tsai and Lo scheme has been found vulnerable to server spoofing attack (misrepresentation attack), de-synchronization attack and denial-of-service attack, which renders the scheme unsuitable for practical deployment in different wireless mobile access networks. Therefore, we have proposed an improved model based on bilinear pairing, countering the identified threats posed to Tsai and Lo scheme. Besides, the proposed work also demonstrates performance evaluation and formal security analysis.

A Study on Networking Technology for Cloud Data Centers (클라우드 데이터센터를 위한 네트워킹 기술에 관한 연구)

  • Choi, Jung-Yul
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.235-243
    • /
    • 2016
  • Legacy data centers are transforming toward cloud data centers according to the advance of mobile and Internet of Things technology, processing of big data, and development of cloud computing technology. The goal of cloud data centers is to efficiently manage energy and facility, and to rapidly provide service demands to users by operating virtualized ICT(Information and Communication Technology) resources. Accordingly, it requires to configure and operate networks for efficiently providing virtualized ICT resources. This paper analyzes networking technologies suitable for cloud data centers and presents ways to efficiently operate the data center.

Resource Allocation for Converged Mobile Multimedia Services (모바일 멀티미디어 융합 서비스를 위한 자원 할당 방법)

  • Lee, Jong-Chan;Lee, Moon-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.1
    • /
    • pp.45-54
    • /
    • 2012
  • Advances in mobile communication and digital video technology enable to commercialize converged multimedia services such as VoD in the mobile networks. Media convergence is evolving into U-Cloud and mobile IP-TV services constituted by high-speed mobile multimedia networks and integrated personal devices. This paper proposes a resource allocation scheme to guarantee QoS of converged mobile multimedia services, and simultaneously maximize legacy services in heterogeneous wireless networks. Performances are analyzed by the simulation.