• Title/Summary/Keyword: Low cloud

Search Result 466, Processing Time 0.028 seconds

Task Scheduling and Resource Management Strategy for Edge Cloud Computing Using Improved Genetic Algorithm

  • Xiuye Yin;Liyong Chen
    • Journal of Information Processing Systems
    • /
    • v.19 no.4
    • /
    • pp.450-464
    • /
    • 2023
  • To address the problems of large system overhead and low timeliness when dealing with task scheduling in mobile edge cloud computing, a task scheduling and resource management strategy for edge cloud computing based on an improved genetic algorithm was proposed. First, a user task scheduling system model based on edge cloud computing was constructed using the Shannon theorem, including calculation, communication, and network models. In addition, a multi-objective optimization model, including delay and energy consumption, was constructed to minimize the sum of two weights. Finally, the selection, crossover, and mutation operations of the genetic algorithm were improved using the best reservation selection algorithm and normal distribution crossover operator. Furthermore, an improved legacy algorithm was selected to deal with the multi-objective problem and acquire the optimal solution, that is, the best computing task scheduling scheme. The experimental analysis of the proposed strategy based on the MATLAB simulation platform shows that its energy loss does not exceed 50 J, and the time delay is 23.2 ms, which are better than those of other comparison strategies.

A Study on the Security Framework for IoT Services based on Cloud and Fog Computing (클라우드와 포그 컴퓨팅 기반 IoT 서비스를 위한 보안 프레임워크 연구)

  • Shin, Minjeong;Kim, Sungun
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1928-1939
    • /
    • 2017
  • Fog computing is another paradigm of the cloud computing, which extends the ubiquitous services to applications on many connected devices in the IoT (Internet of Things). In general, if we access a lot of IoT devices with existing cloud, we waste a huge amount of bandwidth and work efficiency becomes low. So we apply the paradigm called fog between IoT devices and cloud. The network architecture based on cloud and fog computing discloses the security and privacy issues according to mixed paradigm. There are so many security issues in many aspects. Moreover many IoT devices are connected at fog and they generate much data, therefore light and efficient security mechanism is needed. For example, with inappropriate encryption or authentication algorithm, it causes a huge bandwidth loss. In this paper, we consider issues related with data encryption and authentication mechanism in the network architecture for cloud and fog-based M2M (Machine to Machine) IoT services. This includes trusted encryption and authentication algorithm, and key generation method. The contribution of this paper is to provide efficient security mechanisms for the proposed service architecture. We implemented the envisaged conceptual security check mechanisms and verified their performance.

The Generative Mechanism of Cloud Streets

  • Kang Sung-Dae;Kimura Fujio
    • Environmental Sciences Bulletin of The Korean Environmental Sciences Society
    • /
    • v.1 no.2
    • /
    • pp.119-124
    • /
    • 1997
  • Cloud streets were successfully simulated by numerical model (RAMS) including an isolated mountain near the coast, large sensible heat flux from the sea surface, uniform stratification and wind velocity with low Froude number (0.25) in the inflow boundary. The well developed cloud streets between a pair of convective rolls are simulated at a level of 1 km over the sea. The following five results were obtained: 1) For the formation of the pair of convective rolls, both strong static instability and a topographically induced mechanical disturbance are strongly required at the same time. 2) Strong sensible heat flux from the sea surface is the main energy source of the pair of convective rolls, and the buoyancy caused by condensation in the cloud is negligibly small. 3) The pair of convective rolls is a complex of two sub-rolls. One is the outer roll, which has a large radius, but weak circulation, and the other is the inner roll, which has a small radius, but strong circulation. The outer roll gathers a large amount of moisture by convergence in the lower marine boundary, and the inner roll transfers the convergent moisture to the upper boundary layer by strong upward motion between them. 4) The pair of inner rolls form the line-shaped cloud streets, and keep them narrow along the center-line of the domain. 5) Both by non-hydrostatic and by hydrostatic assumptions, cloud streets can be simulated. In our case, non-hydrostatic processes enhanced somewhat the formation of cloud streets. The horizontal size of the topography does not seem to be restricted to within the small scale where non-hydrostatic effects are important.

  • PDF

Study on clustering of satellite images by K-means algorithm

  • 설상동;김정선
    • Proceedings of the Korean Institute of Communication Sciences Conference
    • /
    • 1987.04a
    • /
    • pp.9-13
    • /
    • 1987
  • K-emans alsor/thm was used to classify cloud-type that is low, mix and cumuionimbus Tnitiat ciustercenters and K parameter is given in this paper by coatse computins and Fisher’s alsorithm. Results indicate that performance index is minimized and mix cloud is well clallified.

  • PDF

Reservation based Resource Management for SDN-based UE Cloud

  • Sun, Guolin;Kefyalew, Dawit;Liu, Guisong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5174-5190
    • /
    • 2016
  • Recent years have witnessed an explosive growth of mobile devices, mobile cloud computing services offered by these devices and the remote clouds behind them. In this paper, we noticed ultra-low latency service, as a type of mobile cloud computing service, requires extremely short delay constraints. Hence, such delay-sensitive applications should be satisfied with strong QoS guarantee. Existing solutions regarding this problem have poor performance in terms of throughput. In this paper, we propose an end-to-end bandwidth resource reservation via software defined scheduling inspired by the famous SDN framework. The main contribution of this paper is the end-to-end resource reservation and flow scheduling algorithm, which always gives priority to delay sensitive flows. Simulation results confirm the advantage of the proposed solution, which improves the average throughput of ultra-low latency flows.

Point Cloud Data Driven Level of detail Generation in Low Level GPU Devices (Low Level GPU에서 Point Cloud를 이용한 Level of detail 생성에 대한 연구)

  • Kam, JungWon;Gu, BonWoo;Jin, KyoHong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.6
    • /
    • pp.542-553
    • /
    • 2020
  • Virtual world and simulation need large scale map rendering. However, rendering too many vertices is a computationally complex and time-consuming process. Some game development companies have developed 3D LOD objects for high-speed rendering based on distance between camera and 3D object. Terrain physics simulation researchers need a way to recognize the original object shape from 3D LOD objects. In this paper, we proposed simply automatic LOD framework using point cloud data (PCD). This PCD was created using a 6-direct orthographic ray. Various experiments are performed to validate the effectiveness of the proposed method. We hope the proposed automatic LOD generation framework can play an important role in game development and terrain physic simulation.

Filaments and Dense Cores in Perseus Molecular Cloud

  • Chung, Eun Jung;Lee, Chang Won
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.41 no.2
    • /
    • pp.38.2-38.2
    • /
    • 2016
  • How dense cores and filaments in molecular clouds form is one of key questions in star formation. To challenge this issue we started to make a systematic mapping survey of nearby molecular clouds in various environments with TRAO 14m telescope equipped with 16 beam array, in high ($N_2H^+$, $HCO^+$ 1-0) and low ($C^{18}O$, $^{13}CO$ 1-0) density tracers (TRAO Multi-beam Legacy Survey of Nearby Filamentary Molecular Clouds, PI: C. W. Lee). We pursue to dynamically and chemically understand how filaments, dense cores, and stars form under different environments. We have performed On-The-Fly (OTF) mapping observations toward L1251, southern part of Perseus molecular cloud, and Serpens main molecular cloud from January to May, 2016. In total, ~3.5 square degree area map of $^{13}CO$ and $C^{18}O$ was simultaneously obtained with S/N of >10 in a velocity resolution of ~0.2 km/s. Dense core regions of ~1.7 square degree area where $C^{18}O$ 1-0 line is strongly detected were also mapped in $N_2H^+$ 1-0 and $HCO^+$ 1-0. The L1251 and Perseus MC are known to be low- to intermediate-mass star-forming clouds, while the Serpens MC is an active low-mass star-forming cloud. The observed molecular filaments will help to understand how the filaments, cores and eventually stars form in a low- and/or intermediate-mass star-forming environment. In this talk, I'll give a brief report on the observation and show preliminary results of Perseus MC.

  • PDF

Research Trend Analysis Using Bibliographic Information and Citations of Cloud Computing Articles: Application of Social Network Analysis (클라우드 컴퓨팅 관련 논문의 서지정보 및 인용정보를 활용한 연구 동향 분석: 사회 네트워크 분석의 활용)

  • Kim, Dongsung;Kim, Jongwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.195-211
    • /
    • 2014
  • Cloud computing services provide IT resources as services on demand. This is considered a key concept, which will lead a shift from an ownership-based paradigm to a new pay-for-use paradigm, which can reduce the fixed cost for IT resources, and improve flexibility and scalability. As IT services, cloud services have evolved from early similar computing concepts such as network computing, utility computing, server-based computing, and grid computing. So research into cloud computing is highly related to and combined with various relevant computing research areas. To seek promising research issues and topics in cloud computing, it is necessary to understand the research trends in cloud computing more comprehensively. In this study, we collect bibliographic information and citation information for cloud computing related research papers published in major international journals from 1994 to 2012, and analyzes macroscopic trends and network changes to citation relationships among papers and the co-occurrence relationships of key words by utilizing social network analysis measures. Through the analysis, we can identify the relationships and connections among research topics in cloud computing related areas, and highlight new potential research topics. In addition, we visualize dynamic changes of research topics relating to cloud computing using a proposed cloud computing "research trend map." A research trend map visualizes positions of research topics in two-dimensional space. Frequencies of key words (X-axis) and the rates of increase in the degree centrality of key words (Y-axis) are used as the two dimensions of the research trend map. Based on the values of the two dimensions, the two dimensional space of a research map is divided into four areas: maturation, growth, promising, and decline. An area with high keyword frequency, but low rates of increase of degree centrality is defined as a mature technology area; the area where both keyword frequency and the increase rate of degree centrality are high is defined as a growth technology area; the area where the keyword frequency is low, but the rate of increase in the degree centrality is high is defined as a promising technology area; and the area where both keyword frequency and the rate of degree centrality are low is defined as a declining technology area. Based on this method, cloud computing research trend maps make it possible to easily grasp the main research trends in cloud computing, and to explain the evolution of research topics. According to the results of an analysis of citation relationships, research papers on security, distributed processing, and optical networking for cloud computing are on the top based on the page-rank measure. From the analysis of key words in research papers, cloud computing and grid computing showed high centrality in 2009, and key words dealing with main elemental technologies such as data outsourcing, error detection methods, and infrastructure construction showed high centrality in 2010~2011. In 2012, security, virtualization, and resource management showed high centrality. Moreover, it was found that the interest in the technical issues of cloud computing increases gradually. From annual cloud computing research trend maps, it was verified that security is located in the promising area, virtualization has moved from the promising area to the growth area, and grid computing and distributed system has moved to the declining area. The study results indicate that distributed systems and grid computing received a lot of attention as similar computing paradigms in the early stage of cloud computing research. The early stage of cloud computing was a period focused on understanding and investigating cloud computing as an emergent technology, linking to relevant established computing concepts. After the early stage, security and virtualization technologies became main issues in cloud computing, which is reflected in the movement of security and virtualization technologies from the promising area to the growth area in the cloud computing research trend maps. Moreover, this study revealed that current research in cloud computing has rapidly transferred from a focus on technical issues to for a focus on application issues, such as SLAs (Service Level Agreements).

Classification Model for Cloud-based Public Service (클라우드 기반의 공공 서비스 유형 분류 모델)

  • Ra, Jong-Hei;Lee, Ji-Yeon;Shin, Sun-Young;Kim, Jeong-Yeop;Choi, Young-Jin
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.4
    • /
    • pp.509-516
    • /
    • 2013
  • Cloud services are recognized the essential IT infrastructure in the optimal smart society which is changing rapidly as a low-cost and high-efficiency. This service of starting from prominent overseas companies such as Google, Amazon, had influenced on the introduction of the service for the various policies of foreign governments, including the United States and the United Kingdom. Such countries adopting to the cloud computing and make transform to the cloud service of existing public service for the effective management of information resources. In this study, we have proposed the main determining factors of cloud adoption, the model of cloud governance for the adoption of public cloud service.

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud

  • Xiong, Jinbo;Yao, Zhiqiang;Ma, Jianfeng;Liu, Ximeng;Li, Qi;Ma, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.282-304
    • /
    • 2014
  • Each cloud service has numerous owners and tenants, so it is necessary to construct a privacy preserving identity management and access control mechanism for cloud computing. On one hand, cloud service providers (CSP) depend on tenant's identity information to enforce appropriate access control so that cloud resources are only accessed by the authorized tenants who are willing to pay. On the other hand, tenants wish to protect their personalized service access patterns, identity privacy information and accessing newfangled cloud services by on-demand ways within the scope of their permissions. There are many identity authentication and access control schemes to address these challenges to some degree, however, there are still some limitations. In this paper, we propose a new comprehensive approach, called Privacy pReserving Identity and Access Management scheme, referred to as PRIAM, which is able to satisfy all the desirable security requirements in cloud computing. The main contributions of the proposed PRIAM scheme are threefold. First, it leverages blind signature and hash chain to protect tenant's identity privacy and implement secure mutual authentication. Second, it employs the service-level agreements to provide flexible and on-demand access control for both tenants and cloud services. Third, it makes use of the BAN logic to formally verify the correctness of the proposed protocols. As a result, our proposed PRIAM scheme is suitable to cloud computing thanks to its simplicity, correctness, low overhead, and efficiency.