• 제목/요약/키워드: iCanCloud

Search Result 133, Processing Time 0.021 seconds

Object Detection with LiDAR Point Cloud and RGBD Synthesis Using GNN

  • Jung, Tae-Won;Jeong, Chi-Seo;Lee, Jong-Yong;Jung, Kye-Dong
    • International journal of advanced smart convergence
    • /
    • v.9 no.3
    • /
    • pp.192-198
    • /
    • 2020
  • The 3D point cloud is a key technology of object detection for virtual reality and augmented reality. In order to apply various areas of object detection, it is necessary to obtain 3D information and even color information more easily. In general, to generate a 3D point cloud, it is acquired using an expensive scanner device. However, 3D and characteristic information such as RGB and depth can be easily obtained in a mobile device. GNN (Graph Neural Network) can be used for object detection based on these characteristics. In this paper, we have generated RGB and RGBD by detecting basic information and characteristic information from the KITTI dataset, which is often used in 3D point cloud object detection. We have generated RGB-GNN with i-GNN, which is the most widely used LiDAR characteristic information, and color information characteristics that can be obtained from mobile devices. We compared and analyzed object detection accuracy using RGBD-GNN, which characterizes color and depth information.

OneNet Cloud Computing Based Real-time Home Security System (OneNet 클라우드 컴퓨팅 기반 실시간 홈 보안 시스템)

  • Kim, Kang-Chul;Zhao, Yongjiang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.1
    • /
    • pp.101-108
    • /
    • 2021
  • This paper builds a real-time home security system based on the OneNet cloud platform to control the status of the house through a smartphone. The system consists of a local part and a cloud part. The local part has I/O devices, router and Raspberry Pi (RPi) that collects and monitors sensor data and sends the data to the cloud, and the Flask web server is implemented on a Rasberry Pi. When a user is at home, the user can access the Flask web server to obtain the data directly. The cloud part is OneNet in China Mobile, which provides remote access service. The hybrid App is designed to provide the interaction between users and the home security system in the smartphone, and the EDP and RTSP protocol is implemented to transmit data and video stream. Experimental results show that users can receive sensor data and warning text message through the smartphone and monitor, and control home status through OneNet cloud.

Sensitivity Test of the Parameterization Methods of Cloud Droplet Activation Process in Model Simulation of Cloud Formation (구름방울 활성화 과정 모수화 방법에 따른 구름 형성의 민감도 실험)

  • Kim, Ah-Hyun;Yum, Seong Soo;Chang, Dong Yeong
    • Atmosphere
    • /
    • v.28 no.2
    • /
    • pp.211-222
    • /
    • 2018
  • Cloud droplet activation process is well described by $K{\ddot{o}}hler$ theory and several parameterizations based on $K{\ddot{o}}hler$ theory are used in a wide range of models to represent this process. Here, we test the two different method of calculating the solute effect in the $K{\ddot{o}}hler$ equation, i.e., osmotic coefficient method (OSM) and ${\kappa}-K{\ddot{o}}hler$ method (KK). To do that, each method is implemented in the cloud droplet activation parameterization module of WRF-CHEM (Weather Research and Forecasting model coupled with Chemistry) model. It is assumed that aerosols are composed of five major components (i.e., sulfate, organic matter, black carbon, mineral dust, and sea salt). Both methods calculate similar representative hygroscopicity parameter values of 0.2~0.3 over the land, and 0.6~0.7 over the ocean, which are close to estimated values in previous studies. Simulated precipitation, and meteorological variables (i.e., specific heat and temperature) show good agreement with reanalysis. Spatial patterns of precipitation and liquid water path from model results and satellite data show similarity in general, but on regional scale spatial patterns and intensity show some discrepancy. However, meteorological variables, precipitation, and liquid water path do not show significant differences between OSM and KK simulations. So we suggest that the relatively simple KK method can be a good alternative to the OSM method that requires various information of density, molecular weight and dissociation number of each individual species in calculating the solute effect.

Supporting Web-Based I/O Service by Extending Network Communication to Native Client (Native Client 네트워크 기능 확장을 통한 웹기반 I/O 서비스 지원)

  • Sung, Baegjae;Park, Sejin;Park, Chanik
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.6 no.4
    • /
    • pp.249-254
    • /
    • 2011
  • A user desktop service can be made available on internet or local area network with the help of virtualization and cloud technologies. The service is usually called a virtual desktop or a desktop cloud. However, a user interface is limited to I/O capabilities of a user's mobile terminal. In order to enhance a user interface on a remote virtual desktop, it is important to connect full-featured I/O devices which are founded locally. Our previous work called SoD (System-on- Demand) has proposed a technique to associate local full-featured I/O devices with a remote virtual desktop in Xen. On the technique, it is required to install a SoD client agent in a user's mobile terminal for connecting a remote virtual desktop. In this paper, we propose a new framework called Web-SoD that does not require any explicit installation to make SoD service available. The SoD client agent is provided by the web technology so that the agent can be installed transparently, and the platform independency is also achieved. Due to insufficient network socket performance of current web technologies, we extend Native Client (NaCl) proposed by Google to support a network functionality by modifying a NaCl library and a service runtime. With conducted experiment, we show that the network extension supports a full socket functionality over the compromised overhead on the web environment.

Dynamic Bandwidth Distribution Method for High Performance Non-volatile Memory in Cloud Computing Environment (클라우드 환경에서 고성능 저장장치를 위한 동적 대역폭 분배 기법)

  • Kwon, Piljin;Ahn, Sungyong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.97-103
    • /
    • 2020
  • Linux Cgroups takes a fundamental role for sharing system resources among multiple containers on container-based cloud computing environment. Especially for I/O resource, Linux Cgroups supports a mechanism for sharing I/O bandwidth in proportion to I/O weight. However, the current mechanism of Linux Cgroups using BFQ I/O scheduler seriously degrades the I/O performance with high bandwidth storage device such as NVMe SSDs. In this paper, we proposed a new feedback based I/O bandwidth sharing scheme for Linux Cgroups which allocates I/O credits to containers according to I/O weights and adjusts the amount of credits to performance fluctuation of NVMe SSDs. The proposed scheme is implemented on Linux kernel 5.3 and evaluated. The evaluation results show that it can share the I/O bandwidth among multiple containers proportionally to I/O weights while improving I/O performance more than twice as high as the existing scheme.

Multi-objective Optimization Model with AHP Decision-making for Cloud Service Composition

  • Liu, Li;Zhang, Miao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3293-3311
    • /
    • 2015
  • Cloud services are required to be composed as a single service to fulfill the workflow applications. Service composition in Cloud raises new challenges caused by the diversity of users with different QoS requirements and vague preferences, as well as the development of cloud computing having geographically distributed characteristics. So the selection of the best service composition is a complex problem and it faces trade-off among various QoS criteria. In this paper, we propose a Cloud service composition approach based on evolutionary algorithms, i.e., NSGA-II and MOPSO. We utilize the combination of multi-objective evolutionary approaches and Decision-Making method (AHP) to solve Cloud service composition optimization problem. The weights generated from AHP are applied to the Crowding Distance calculations of the above two evolutionary algorithms. Our algorithm beats single-objective algorithms on the optimization ability. And compared with general multi-objective algorithms, it is able to precisely capture the users' preferences. The results of the simulation also show that our approach can achieve a better scalability.

A Study on the Usage of Investigation of Google Cloud Data (Smartphone user-oriented) (구글 클라우드 데이터의 수사활용 방안에 관한 연구 (스마트폰 사용자 중심))

  • Kim, Dongho;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.109-120
    • /
    • 2018
  • The smartphone is the communication device that is the most personal to the user, and it keeps a lot of information related to the user and makes information communication with other devices. With these characteristics, forensics on smartphones are one of the most basic methods of investigation in criminal investigations, and have actually contributed to the settlement of the case by providing many clues. However, recently, it is designed to encrypt data stored as a social issue related to the protection of user's personal information, or to delete deleted data or to delete log data together. So, any solutions? In this paper, I try to find the answer from cloud data stored by smartphone user account. Cloud forensics should approach complementary relationships rather than smartphone forensics. There are a lot of data stored in the cloud that can be meaningfully used in the investigation. Online activity information of users, such as Internet usage, YouTube view, and contents purchase information, cloud service such as e-mail, cloud drive, and location information are the most representative data. These data can be unvaluable, but here are some important clues in various types of criminal investigations. In this paper, I propose a method to extract data from the google cloud so that the data can be used for investigation, and to utilize the extracted data for investigation. And it explains the role of the extracted artifacts in the actual investigation business through virtual cases and proves its value.

Development of a Distributed File System for Multi-Cloud Rendering (멀티 클라우드 렌더링을 위한 분산 파일 시스템 개발 )

  • Hyokyung, Bahn;Kyungwoon, Cho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.1
    • /
    • pp.77-82
    • /
    • 2023
  • Multi-cloud rendering has been attracting attention recently as the computational load of rendering fluctuates over time and each rendering process can be performed independently. However, it is challenging in multi-cloud rendering to deliver large amounts of input data instantly with consistency constraints. In this paper, we develop a new distributed file system for multi-cloud rendering. In our file system, a local machine maintains a file server that manages versions of rendering input files, and each cloud node maintains a rendering cache manager, which performs distributed cooperative caching by considering file versions. Measurement studies with rendering workloads show that the proposed file system performs better than NFS and the uploading schemes by 745% and 56%, respectively, in terms of I/O throughput and execution time.

Generic Costing Scheme Using General Equilibrium Theory for Fair Cloud Service Charging

  • Hussin, Masnida;Jalal, Siti Fajar;Latip, Rohaya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.58-73
    • /
    • 2021
  • Cloud Service Providers (CSPs) enable their users to access Cloud computing and storage services from anywhere in quick and flexible manners through the Internet. With the basis of 'pay-as-you-go' model, it makes the interactions between CSPs and the users play a vital role in shaping the Cloud computing market. A pool of virtualized and dynamically scalable Cloud services that delivered on demand to the users is associated with guaranteed performance and cost-provisioning. It needed a costing scheme for determining suitable charges in order to secure lease pricing of the Cloud services. However, it is hard to meet the satisfied prices for both CSPs and users due to their conflicting needs. Furthermore, there is lack of Service Level Agreements (SLAs) that allowing the users to take part into price negotiating process. The users may lose their interest to use Cloud services while reducing CSPs profit. Therefore, this paper proposes a generic costing scheme for Cloud services using General Equilibrium Theory (GET). GET helps to formulate the price function for various services' factors to match with various demands from the users. It is initially determined by identifying the market circumstances that a general equilibrium will be hold and reached. Specifically, there are two procedures of agreement made in response to (i) established equilibrium supply and demand, and (ii) service price formed and constructed in a price range. The SLAs in our costing scheme is integrated to satisfy both CSPs and users' needs while minimizing their conflicts. The price ranging strategy is deliberated to provide prices' options to the users with respect their budget limit. Meanwhile, the CSPs can adaptively charge based on users' preferences without losing their profit. The costing scheme is testable and analyzed in multi-tenant computing environments. The results from our simulation experiments demonstrate that the proposed costing scheme provides better users' satisfaction while fostering fairness pricing in the Cloud market.

A Study on Operating the IaaS Cloud Computing in view of Integrated Security Management System (통합보안관리시스템을 고려한 IaaS 클라우드 컴퓨팅 운영에 관한 연구)

  • Choi, Ju-Young;Park, Choon-Sik;Kim, Myuhng-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.141-153
    • /
    • 2012
  • In the recent years, various researches on the use cases of the cloud computing service have been achieved for its standardization. Notwithstanding, we need more additory effort to refine the operating mechanisms on the cloud computing environment. In this paper, we suggest an operating mechanism on IaaS cloud computing environment that is related to the integrated security management system. By using CloudStack 2.2.4 toolkit, we have built a test-bed for IaaS cloud computing service i.e., SWU-IaaS cloud computing environment. Through operating this hierarchical SWU-IaaS cloud computing environment, we have derived the attributes and the methods of its components. Its scenarios can be described in case of both normal state and abnormal state. At the end, a special scenario has been described when it receives a security event from the integrated security management system.