• Title/Summary/Keyword: Amount of Cloud

Search Result 390, Processing Time 0.021 seconds

A Function Level Static Offloading Scheme for Saving Energy of Mobile Devices in Mobile Cloud Computing (모바일 클라우드 컴퓨팅에서 모바일 기기의 에너지 절약을 위한 함수 수준 정적 오프로딩 기법)

  • Min, Hong;Jung, Jinman;Heo, Junyoung
    • Journal of KIISE
    • /
    • v.42 no.6
    • /
    • pp.707-712
    • /
    • 2015
  • Mobile cloud computing is a technology that uses cloud services to overcome resource constrains of a mobile device, and it applies the computation offloading scheme to transfer a portion of a task which should be executed from a mobile device to the cloud. If the communication cost of the computation offloading is less than the computation cost of a mobile device, the mobile device commits a certain task to the cloud. The previous cost analysis models, which were used for separating functions running on a mobile device and functions transferring to the cloud, only considered the amount of data transfer and response time as the offloading cost. In this paper, we proposed a new task partitioning scheme that considers the frequency of function calls and data synchronization, during the cost estimation of the computation offloading. We also verified the energy efficiency of the proposed scheme by using experimental results.

Effects of Meteorological Conditions on Cloud and Snowfall Simulations in the Yeongdong Region: A Case Study Based on Ideal Experiments (영동지역 기상조건이 구름 및 강설 모의에 미치는 영향: 이상 실험 기반의 사례 연구)

  • Kim, Yoo-Jun;Ahn, Bo-Yeong;Kim, Baek-Jo;Kim, Seungbum
    • Atmosphere
    • /
    • v.31 no.4
    • /
    • pp.445-459
    • /
    • 2021
  • This study uses a cloud-resolving storm simulator (CReSS) to understand the individual effect of determinant meteorological factors on snowfall characteristics in the Yeongdong region based on the rawinsonde soundings for two snowfall cases that occurred on 23 February (Episode 1) and 13 December (Episode 2) 2016; one has a single-layered cloud and the other has two-layered cloud structure. The observed cloud and precipitation (snow crystal) features were well represented by a CReSS model. The first ideal experiment with a decrease in low-level temperature for Episode 1 indicates that total precipitation amount was decreased by 19% (26~27% in graupel and 53~67% in snow) compared with the control experiment. In the ideal experiment that the upper-level wind direction was changed from westerly to easterly, although total precipitation was decreased for Episode 1, precipitation was intensified over the southwestern side (specifically in terrain experiment) of the sounding point (128.855°E, 37.805°N). In contrast, the precipitation for Episode 2 was increased by 2.3 times greater than the control experiment under terrain condition. The experimental results imply that the low-level temperature and upper-level dynamics could change the location and characteristics of precipitation in the Yeongdong region. However, the difference in precipitation between the single-layered experiment and control (two-layered) experiment for Episode 2 was negligible to attribute it to the effect of upper-level cloud. The current results could be used for the development of guidance of snowfall forecast in this region.

Calculation of Solar radiation based on Cloud Data for Major cities of Korea (국내 주요도시의 운량데이터를 이용한 일사산출)

  • Yoo, Ho-Chun;Lee, Kwan-Ho;Park, So-Hee
    • 한국태양에너지학회:학술대회논문집
    • /
    • 2008.04a
    • /
    • pp.142-147
    • /
    • 2008
  • Limited fossil fuels and unstable energy supply are considered as one of the critical problems in architecture requiring large amounts of energy. In order to this challenge, environment-friendly architecture design is required. Especially, Application of solar energy as a clean energy source and one kind of renewable energy. Many sites however are mainly concentrated in the developed countries, and are scarcer within the developing world. Simple radiation estimation models using meteorologically observed input parameters are often used in the applications requiring rough estimations of solar radiation. In this paper, measurements of global solar radiation and cloud data hours in climatological locations in South Korea are used to develop an estimation in solar radiation. The results of measured data are compared with the results obtained from equations, internationally accepted correlations.

  • PDF

Towards efficient sharing of encrypted data in cloud-based mobile social network

  • Sun, Xin;Yao, Yiyang;Xia, Yingjie;Liu, Xuejiao;Chen, Jian;Wang, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1892-1903
    • /
    • 2016
  • Mobile social network is becoming more and more popular with respect to the development and popularity of mobile devices and interpersonal sociality. As the amount of social data increases in a great deal and cloud computing techniques become developed, the architecture of mobile social network is evolved into cloud-based that mobile clients send data to the cloud and make data accessible from clients. The data in the cloud should be stored in a secure fashion to protect user privacy and restrict data sharing defined by users. Ciphertext-policy attribute-based encryption (CP-ABE) is currently considered to be a promising security solution for cloud-based mobile social network to encrypt the sensitive data. However, its ciphertext size and decryption time grow linearly with the attribute numbers in the access structure. In order to reduce the computing overhead held by the mobile devices, in this paper we propose a new Outsourcing decryption and Match-then-decrypt CP-ABE algorithm (OM-CP-ABE) which firstly outsources the computation-intensive bilinear pairing operations to a proxy, and secondly performs the decryption test on the attributes set matching access policy in ciphertexts. The experimental performance assessments show the security strength and efficiency of the proposed solution in terms of computation, communication, and storage. Also, our construction is proven to be replayable choosen-ciphertext attacks (RCCA) secure based on the decisional bilinear Diffie-Hellman (DBDH) assumption in the standard model.

Security Determinants of the Educational Use of Mobile Cloud Computing in Higher Education

  • Waleed Alghaith
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.50-62
    • /
    • 2024
  • The decision to integrate mobile cloud computing (MCC) in higher education without first defining suitable usage scenarios is a global issue as the usage of such services becomes extensive. Consequently, this study investigates the security determinants of the educational use of mobile cloud computing among universities' students. This study proposes and develops a theoretical model by adopting and modifying the Protection Motivation Theory (PMT). The study's findings show that a significant amount of variance in MCC adoption was explained by the proposed model. MCC adoption intention was shown to be highly influenced by threat appraisal and coping appraisal factors. Perceived severity alone explains 37.8% of students "Intention" to adopt MCC applications, which indicates the student's perception of the degree of harm that would happen can hinder them from using MCC. It encompasses concerns about data security, privacy breaches, and academic integrity issues. Response cost, perceived vulnerability and response efficacy also have significant influence on students "intention" by 18.8%, 17.7%, and 6.7%, respectively.

Security Determinants of the Educational Use of Mobile Cloud Computing in Higher Education

  • Waleed Alghaith
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.105-118
    • /
    • 2024
  • The decision to integrate mobile cloud computing (MCC) in higher education without first defining suitable usage scenarios is a global issue as the usage of such services becomes extensive. Consequently, this study investigates the security determinants of the educational use of mobile cloud computing among universities students. This study proposes and develops a theoretical model by adopting and modifying the Protection Motivation Theory (PMT). The studys findings show that a significant amount of variance in MCC adoption was explained by the proposed model. MCC adoption intention was shown to be highly influenced by threat appraisal and coping appraisal factors. Perceived severity alone explains 37.8% of students "Intention" to adopt MCC applications, which indicates the student's perception of the degree of harm that would happen can hinder them from using MCC. It encompasses concerns about data security, privacy breaches, and academic integrity issues. Response cost, perceived vulnerability and response efficacy also have significant influence on students "intention" by 18.8%, 17.7%, and 6.7%, respectively.

Profit-Maximizing Virtual Machine Provisioning Based on Workload Prediction in Computing Cloud

  • Li, Qing;Yang, Qinghai;He, Qingsu;Kwak, Kyung Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4950-4966
    • /
    • 2015
  • Cloud providers now face the problem of estimating the amount of computing resources required to satisfy a future workload. In this paper, a virtual machine provisioning (VMP) mechanism is designed to adapt workload fluctuation. The arrival rate of forthcoming jobs is predicted for acquiring the proper service rate by adopting an exponential smoothing (ES) method. The proper service rate is estimated to guarantee the service level agreement (SLA) constraints by using a diffusion approximation statistical model. The VMP problem is formulated as a facility location problem. Furthermore, it is characterized as the maximization of submodular function subject to the matroid constraints. A greedy-based VMP algorithm is designed to obtain the optimal virtual machine provision pattern. Simulation results illustrate that the proposed mechanism could increase the average profit efficiently without incurring significant quality of service (QoS) violations.

An adaptive fault tolerance strategy for cloud storage

  • Xiai, Yan;Dafang, Zhang;Jinmin, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5290-5304
    • /
    • 2016
  • With the growth of the massive amount of data, the failure probability of the cloud storage node is becoming more and more big. A single fault tolerance strategy, such as replication and erasure codes, has some unavoidable disadvantages, which can not meet the needs of the today's fault tolerance. Therefore, according to the file access frequency and size, an adaptive hybrid redundant fault tolerance strategy is proposed, which can dynamically change between the replication scheme and erasure codes scheme throughout the lifecycle. The experimental results show that the proposed scheme can not only save the storage space(reduced by 32% compared with replication), but also ensure the fast recovery of the node failures(increased by 42% compared with erasure codes).

Heuristic based Energy-aware Resource Allocation by Dynamic Consolidation of Virtual Machines in Cloud Data Center

  • Sabbir Hasan, Md.;Huh, Eui-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.1825-1842
    • /
    • 2013
  • Rapid growth of the IT industry has led to significant energy consumption in the last decade. Data centers swallow an enormous amount of electrical energy and have high operating costs and carbon dioxide excretions. In response to this, the dynamic consolidation of virtual machines (VMs) allows for efficient resource management and reduces power consumption through the live migration of VMs in the hosts. Moreover, each client typically has a service level agreement (SLA), this leads to stipulations in dealing with energy-performance trade-offs, as aggressive consolidation may lead to performance degradation beyond the negotiation. In this paper we propose a heuristic based resource allocation of VM selection and a VM allocation approach that aims to minimize the total energy consumption and operating costs while meeting the client-level SLA. Our experiment results demonstrate significant enhancements in cloud providers' profit and energy savings while improving the SLA at a certain level.

Generating a Rectangular Net from Unorganized Point Cloud Data Using an Implicit Surface Scheme (음 함수 곡면기법을 이용한 임의의 점 군 데이터로부터의 사각망 생성)

  • Yoo, D.J.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.12 no.4
    • /
    • pp.274-282
    • /
    • 2007
  • In this paper, a method of constructing a rectangular net from unorganized point cloud data is presented. In the method an implicit surface that fits the given point data is generated by using principal component analysis(PCA) and adaptive domain decomposition method(ADDM). Then a complete and quality rectangular net can be obtained by extracting voxel data from the implicit surface and projecting exterior faces of extracted voxels onto the implicit surface. The main advantage of the proposed method is that a quality rectangular net can be extracted from randomly scattered 3D points only without any further information. Furthermore the results of this works can be used to obtain many useful information including a slicing data, a solid STL model and a NURBS surface model in many areas involved in treatment of large amount of point data by proper processing of implicit surface and rectangular net generated previously.