• Title/Summary/Keyword: Cloud model

Search Result 1,256, Processing Time 0.028 seconds

Complete 3D Surface Reconstruction from Unstructured Point Cloud (조직화되지 않은 점군으로부터의 3차원 완전 형상 복원)

  • Li Rixie;Kim Seokil
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.29 no.4 s.235
    • /
    • pp.570-577
    • /
    • 2005
  • In this study a complete 3D surface reconstruction method is proposed based on the concept that the vertices of surface model can be completely matched to the unstructured point cloud. In order to generate the initial mesh model from the point cloud, the mesh subdivision of bounding box and shrink-wrapping algorithm are introduced. The control mesh model for well representing the topology of point cloud is derived from the initial mesh model by using the mesh simplification technique based on the original QEM algorithm, and the parametric surface model for approximately representing the geometry of point cloud is derived by applying the local subdivision surface fitting scheme on the control mesh model. And, to reconstruct the complete matching surface model, the insertion of isolated points on the parametric surface model and the mesh optimization are carried out Especially, the fast 3D surface reconstruction is realized by introducing the voxel-based nearest-point search algorithm, and the simulation results reveal the availability of the proposed surface reconstruction method.

Dynamic Collaborative Cloud Service Platform: Opportunities and Challenges

  • Yoon, Chang-Woo;Hassan, Mohammad Mehedi;Lee, Hyun-Woo;Ryu, Won;Huh, Eui-Nam
    • ETRI Journal
    • /
    • v.32 no.4
    • /
    • pp.634-637
    • /
    • 2010
  • This letter presents a model for a dynamic collaboration (DC) platform among cloud providers (CPs) that prevents adverse business impacts, cloud vendor lock-in and violation of service level agreements with consumers, and also offers collaborative cloud services to consumers. We consider two major challenges. The first challenge is to find an appropriate market model in order to enable the DC platform. The second is to select suitable collaborative partners to provide services. We propose a novel combinatorial auction-based cloud market model that enables a DC platform among CPs. We also propose a new promising multi-objective optimization model to quantitatively evaluate the partners. Simulation experiments were conducted to verify both of the proposed models.

The Effect of Perceived Risk and Trust on Users' Acceptance of Cloud Computing : Mobile Cloud Computing (인지된 위험과 신뢰가 Cloud Computing 사용의도에 미치는 영향 : 모바일 Cloud Computing을 중심으로)

  • Kim, Jun-Woo;Kim, Yong-Gu
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.35 no.3
    • /
    • pp.70-76
    • /
    • 2012
  • This research tested how the perceived risk and the trust affect the usage intention of the cloud computing. To this end, this research setups a research model and tests it with the statistic tools. In order to build the model, TAM (Technology Acceptance Model) and UTAUT (Unified Theory of Acceptance and Use of Technology) were employed and, the factors such as the perceived risk, the trust and the intention of the cloud computing use were derived. This research finds that the perceived risk does not affect the intention of usage. Also the perceived risk has the negative effect for the trust. Thus this research has the following suggestions.

An Empirical Study on the Influence of Environmental Determinants on the Mobile Cloud Computing Technology Usage and the Moderating Effects of Job Relevance (모바일 클라우드 컴퓨팅 기술사용에 영향을 주는 환경적 요인과 직무 관련성의 조절효과에 대한 실증연구)

  • Kim, Sang-Hyun;Kim, Geun-A
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.4
    • /
    • pp.1-20
    • /
    • 2011
  • The recent development of mobile devices, including smartphones has maximized the user's convenience. This phenomenon has triggered the specification and activation of mobile cloud service and transformed the user's information usage and communication means. Despite such development of new technology, there is little understanding of mobile cloud. Therefor, in order to help the understanding of the usage of mobile cloud computing technology, this study developed the research model based on the UTAUT (the Unified Theory of Acceptance and Usage of Technology) model. The proposed research model included five external determinants, such as Interoperability, Information Organization, Adequacy, Information Security and Context Awareness, along with the moderating effects of Job Relevance, and empirically proved their influence on the user's job performance. This study proved the research model by analyzing the data collected from 287 copies of survey with the structural equation modeling approach. The result showed that all determinants, except Information Security have positive impact on the usage of mobile cloud computing technology. Thus, this study can compliment the limitations of previous research, suggest a new direction to analyze the user's perspective in the related research on mobile cloud and build a theoretical foundation for the further development of mobile cloud.

A Framework for Design and Evaluation of Robot Industry Business Model based on Cloud Services in an Aging Society (고령화 사회에서 클라우드 서비스 기반 로봇산업 비즈니스 모델의 설계 및 평가를 위한 프레임워크)

  • Jeon, Hangoo;Seo, Kwang-Kyu
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.441-446
    • /
    • 2013
  • It is expected to change for convergence robotic services according to emergence new communication technologies and cloud computing, etc. Robot industry is evaluated the biggest filed that is possibility to convergence of new IT technology. This paper presents a design framework for robot industry business model on cloud services through the cloud computing and environment of robot industry, features and provide valuable of cloud-based robot service, analysis of customer needs and value chain in the market in an aging society. In addition, we describe the evolution path of the proposed business model in terms of technology development and market. This study is expected to help that cloud and robot services companies when establishing new service model development and marketing strategy.

A Fully Distributed Secure Approach using Nondeterministic Encryption for Database Security in Cloud

  • Srinu Banothu;A. Govardhan;Karnam Madhavi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.140-150
    • /
    • 2024
  • Database-as-a-Service is one of the prime services provided by Cloud Computing. It provides data storage and management services to individuals, enterprises and organizations on pay and uses basis. In which any enterprise or organization can outsource its databases to the Cloud Service Provider (CSP) and query the data whenever and wherever required through any devices connected to the internet. The advantage of this service is that enterprises or organizations can reduce the cost of establishing and maintaining infrastructure locally. However, there exist some database security, privacychallenges and query performance issues to access data, to overcome these issues, in our recent research, developed a database security model using a deterministic encryption scheme, which improved query execution performance and database security level.As this model is implemented using a deterministic encryption scheme, it may suffer from chosen plain text attack, to overcome this issue. In this paper, we proposed a new model for cloud database security using nondeterministic encryption, order preserving encryption, homomorphic encryptionand database distribution schemes, andour proposed model supports execution of queries with equality check, range condition and aggregate operations on encrypted cloud database without decryption. This model is more secure with optimal query execution performance.

Five Forces Model of Computational Power: A Comprehensive Measure Method

  • Wu, Meixi;Guo, Liang;Yang, Xiaotong;Xie, Lina;Wang, Shaopeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2239-2256
    • /
    • 2022
  • In this paper, a model is proposed to comprehensively evaluate the computational power. The five forces model of computational power solves the problem that the measurement units of different indexes are not unified in the process of computational power evaluation. It combines the bidirectional projection method with TOPSIS method. This model is more scientific and effective in evaluating the comprehensive situation of computational power. Lastly, an example shows the validity and practicability of the model.

Influences of Ice Microphysical Processes on Urban Heat Island-Induced Convection and Precipitation (얼음 미시물리 과정이 도시 열섬이 유도하는 대류와 강수에 미치는 영향)

  • Han, Ji-Young;Baik, Jong-Jin
    • Atmosphere
    • /
    • v.17 no.2
    • /
    • pp.195-205
    • /
    • 2007
  • The influences of ice microphysical processes on urban heat island-induced convection and precipitation are numerically investigated using a cloud-resolving model (ARPS). Both warm- and cold-cloud simulations show that the downwind upward motion forced by specified low-level heating, which is regarded as representing an urban heat island, initiates moist convection and results in downwind precipitation. The surface precipitation in the cold-cloud simulation is produced earlier than that in the warm-cloud simulation. The maximum updraft is stronger in the cold-cloud simulation than in the warm-cloud simulation due to the latent heat release by freezing and deposition. The outflow formed in the boundary layer is cooler and propagates faster in the cold-cloud simulation due mainly to the additional cooling by the melting of falling hail particles. The removal of the specified low-level heating after the onset of surface precipitation results in cooler and faster propagating outflow in both the warm- and cold-cloud simulations.

A Study on the Isolated Cloud Security Using Next Generation Network

  • Park, Jae-Kyung;Lee, Won Joo;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.11
    • /
    • pp.9-16
    • /
    • 2017
  • In this paper, we propose to present a model of cloud security that has emerged as the biggest topic of cloud computing, replacing the traditional IT environment. While cloud computing is an extension of existing IT technology, security issues and threats can be applied to traditional security technologies. However, the biggest difference between a typical computing environment and a cloud computing environment is a virtualized environment with a hypervisor. Currently, there are many weaknesses in the virtualized environment, and there are few related security products. In order for a cloud computing environment to function as a reliable IT environment, we expect more research on hypervisor-based security technologies, and we expect to secure safer cloud services through a secure model over the next generation of new-based networks.

LES of a Cumulus Cloud with Explicit Lagrangian Droplets

  • Kang I.S.;Noh Y.;Raasch S.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2006.05a
    • /
    • pp.233-236
    • /
    • 2006
  • LES model of a cumulus cloud is developed in which the motion of a large number of water droplets are explicitly simulated. Model provides various important information of the cloud process such as entrainment and internal mixing, the distribution of droplets within cloud, and the evolution of particle size spectrum.

  • PDF