• Title/Summary/Keyword: Cloud ITS

Search Result 651, Processing Time 0.025 seconds

Active ITS Infrastructure Management Strategy for Enhanced ITS Service (기존 ITS 서비스의 성능 강화를 위한 능동형 ITS 인프라 관리 전략)

  • Choi, Dongwon
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.9
    • /
    • pp.45-53
    • /
    • 2014
  • In this study, we analyzed the next generation ITS (C-ITS) technology trends, focusing on the national and international C-ITS projects. Based on the promotion practices of developed countries, we pointed out the lack of linkages with the existing ITS infrastructure. As a way to overcome this problem, we proposed the three-direction to enable the existing ITS infrastructure corresponding to the C-ITS. First one is developing a technique to improve the performance of the existing ITS infrastructure and automate the performance management (Performance-enhanced ITS). Second, developing active sensors or fusion sensor which along with V2X communication technology implement of an active safety driving support system (Safety-enhanced ITS). Third, we need to develop a technology that generate the new advanced traffic data by integrating the collected data from existing ITS infrastructure and nomadic device (Cloud-ITS). By improving the function of the existing ITS infrastructure for adaptation to the new V2X communication environment, we enhanced the efficiency of maintenance performance and would maximize the benefit of the introduction of C-ITS.

CO Observations Toward IRAS 07280-1829 and Its Related Clouds (적외선원 IRAS 07280-1829와 이와 관련된 분자운의 CO분자선 관측연구)

  • Lee, Chang-Won
    • Journal of the Korean earth science society
    • /
    • v.32 no.4
    • /
    • pp.402-410
    • /
    • 2011
  • We present results of CO observations toward an infrared (IR) source, IRAS 07280-1829, and its possibly related molecular clouds. The physical parameters of this IR source such as its infrared slope (${\alpha}$=16) of the Spectral Energy Distribution and bolometric temperature (145 K) indicate that it is an embedded protostar. Its luminosity is ${\sim}2.9{\times}10^4L_{\odot}$, typical of a massive star. The CO profile toward IRAS 07280-1829 has broad wing components, implying a possible existence of CO outflow. The excitation temperature and mass of a molecular cloud (Cloud A) which is thought to harbor the IR source are estimated to be 9~22 K and ~180 $M_{\odot}$, respectively, indicating the Cloud A is a typical infrared-dark cloud. Its LTE mass is found to be much smaller than its virial mass by more than a factor of 10 which is inconsistent with the fact that a protostar recently formed exists in the Cloud A. This may suggest that the environment of the cloud where the IR source is forming is dominant of turbulence and/or magnetic filed, making its virial mass estimated unusually high.

The Impact of Interaction between Cloud and Longwave Radiation on the Asian Monsoon Circulation (구름-장파복사 상호작용이 아시아 몬순에 미치는 영향)

  • Ryu, Geun-Hyeok;Sohn, Byung-Ju
    • Journal of the Korean earth science society
    • /
    • v.30 no.1
    • /
    • pp.58-68
    • /
    • 2009
  • Three-dimensional distributions of longwave radiation flux for the April-September 1998 period are generated from radiative transfer calculations using the GEWEX Asian Monsoon Experiment (GAME) reanalysis temperature and humidity profiles and International Satellite Cloud Climatology Project (ISCCP) cloudiness as inputs to understand the effect of cloud radiative forcing in the monsoon season. By subtracting the heating of the clear atmosphere from the cloudy radiative heating, cloud-induced atmospheric radiative heating has been obtained. Emphasis is placed on the impact of horizontal gradients of the cloud-generated radiative heating on the Asian monsoon. Cloud-induced heating exhibits its maximum heating areas within the Indian Ocean and minimum heating over the Tibetan Plateau, which establishes the north-south oriented differential heating gradient. Considering that the differential heating is a ultimate source generating the atmospheric circulation, the cloud-induced heating gradient established between the Indian Ocean and the Plateau can enhance the strength of the north-south Hadley-type monsoon circulation. Cooling at cloud top and warming at cloud bottom, which are the vertical distributions of cloud-induced heating, can exert on the monsoon circulation by altering the atmospheric stability.

A Hybrid Cloud Testing System Based on Virtual Machines and Networks

  • Chen, Jing;Yan, Honghua;Wang, Chunxiao;Liu, Xuyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1520-1542
    • /
    • 2020
  • Traditional software testing typically uses many physical resources to manually build various test environments, resulting in high resource costs and long test time due to limited resources, especially for small enterprises. Cloud computing can provide sufficient low-cost virtual resources to alleviate these problems through the virtualization of physical resources. However, the provision of various test environments and services for implementing software testing rapidly and conveniently based on cloud computing is challenging. This paper proposes a multilayer cloud testing model based on cloud computing and implements a hybrid cloud testing system based on virtual machines (VMs) and networks. This system realizes the automatic and rapid creation of test environments and the remote use of test tools and test services. We conduct experiments on this system and evaluate its applicability in terms of the VM provision time, VM performance and virtual network performance. The experimental results demonstrate that the performance of the VMs and virtual networks is satisfactory and that this system can improve the test efficiency and reduce test costs through rapid virtual resource provision and convenient test services.

Two Factor Authentication for Cloud Computing

  • Lee, Shirly;Ong, Ivy;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.427-432
    • /
    • 2010
  • The fast-emerging of cloud computing technology today has sufficiently benefited its wide range of users from individuals to large organizations. It carries an attractive characteristic by renting myriad virtual storages, computing resources and platform for users to manipulate their data or utilize the processing resources conveniently over Internet without the need to know the exact underlying infrastructure which is resided remotely at cloud servers. However due to the loss of direct control over the systems/applications, users are concerned about the risks of cloud services if it is truly secured. In the literature, there are cases where attackers masquerade as cloud users, illegally access to their accounts, by stealing the static login password or breaking the poor authentication gate. In this paper, we propose a two-factor authentication framework to enforce cloud services' authentication process, which are Public Key Infrastructure (PKI) authentication and mobile out-of-band (OOB) authentication. We discuss the framework's security analysis in later session and conclude that it is robust to phishing and replay attacks, prohibiting fraud users from accessing to the cloud services.

A Study on Decision Making Factors of Cloud Computing Adoption Using BCOR Approach (BCOR 접근법을 이용한 클라우드 컴퓨팅 도입의 의사결정 요인에 관한 연구)

  • Lee, Young-Chan;Hanh, Tang Nguyen
    • Journal of Information Technology Services
    • /
    • v.11 no.1
    • /
    • pp.155-171
    • /
    • 2012
  • With the continuous and outstanding development of information technology(IT), human being is coming to the new computing era which is called cloud computing. This era brings lots of huge benefits also at the same time release the resources of IT infrastructure and data boom for man. In the future no longer, most of IT service providers, enterprises, organizations and systems will adopt this new computing model. There are three main deployment models in cloud computing including public cloud, private cloud and hybrid cloud; each one also has its own cons and pros. While implementing any kind of cloud services, customers have to choose one of three above deployment models. Thus, our paper aims to represent a practical framework to help the adopter select which one will be the best suitable deployment model for their requirements by evaluating each model comprehensively. The framework is built by applying the analytic hierarchy process(AHP), namely benefit-cost-opportunity-risk(BCOR) model as a powerful and effective tool to serve the problem. The gained results hope not only to provide useful information for the readers but also to contribute valuable knowledge to this new area. In addition, it might support the practitioners' effective decision making process in case they meet the same issue and have a positive influence on the increase of right decision for the organization.

Development of Cloud Detection Algorithm for Extracting the Cloud-free Land Surface from Daytime NOAA/AVHRR Data (NOAA/AVHRR 주간 자료로부터 지면 자료 추출을 위한 구름 탐지 알고리즘 개발)

  • 서명석;이동규
    • Korean Journal of Remote Sensing
    • /
    • v.15 no.3
    • /
    • pp.239-251
    • /
    • 1999
  • The elimination process of cloud-contaminated pixels is one of important steps before obtaining the accurate parameters of land and ocean surface from AVHRR imagery. We developed a 6step threshold method to detect the cloud-contaminated pixels from NOAA-14/AVHRR datime imagery over land using different combination of channels. This algorithm has two phases : the first is to make a cloud-free characteristic data of land surface using compositing techniques from channel 1 and 5 imagery and a dynamic threshold of brightness temperature, and the second is to identify the each pixel as a cloud-free or cloudy one through 4-step threshold tests. The merits of this method are its simplicity in input data and automation in determining threshold values. The threshold of infrared data is calculated through the combination of brightness temperature of land surface obtained from AVHRR imagery, spatial variance of them and temporal variance of observed land surface temperature. The method detected the could-comtaminated pixels successfully embedded inthe NOAA-14/AVHRR daytime imagery for the August 1 to November 30, 1996 and March 1 to July 30, 1997. This method was evaluated through the comparison with ground-based cloud observations and with the enhanced visible and infrared imagery.

A Review of Security and Privacy of Cloud Based E-Healthcare Systems

  • Faiza Nawaz;Jawwad Ibrahim;Maida Junaid
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.153-160
    • /
    • 2024
  • Information technology plays an important role in healthcare. The cloud has several applications in the fields of education, social media and medicine. But the advantage of the cloud for medical reasons is very appropriate, especially given the large volume of data generated by healthcare organizations. As in increasingly health organizations adopting towards electronic health records in the cloud which can be accessed around the world for various health issues regarding references, healthcare educational research and etc. Cloud computing has many advantages, such as "flexibility, cost and energy savings, resource sharing and rapid deployment". However, despite the significant benefits of using the cloud computing for health IT, data security, privacy, reliability, integration and portability are some of the main challenges and obstacles for its implementation. Health data are highly confidential records that should not be made available to unauthorized persons to protect the security of patient information. In this paper, we discuss the privacy and security requirement of EHS as well as privacy and security issues of EHS and also focus on a comprehensive review of the current and existing literature on Electronic health that uses a variety of approaches and procedures to handle security and privacy issues. The strengths and weaknesses of some of these methods were mentioned. The significance of security issues in the cloud computing environment is a challenge.

Active VM Consolidation for Cloud Data Centers under Energy Saving Approach

  • Saxena, Shailesh;Khan, Mohammad Zubair;Singh, Ravendra;Noorwali, Abdulfattah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.345-353
    • /
    • 2021
  • Cloud computing represent a new era of computing that's forms through the combination of service-oriented architecture (SOA), Internet and grid computing with virtualization technology. Virtualization is a concept through which every cloud is enable to provide on-demand services to the users. Most IT service provider adopt cloud based services for their users to meet the high demand of computation, as it is most flexible, reliable and scalable technology. Energy based performance tradeoff become the main challenge in cloud computing, as its acceptance and popularity increases day by day. Cloud data centers required a huge amount of power supply to the virtualization of servers for maintain on- demand high computing. High power demand increase the energy cost of service providers as well as it also harm the environment through the emission of CO2. An optimization of cloud computing based on energy-performance tradeoff is required to obtain the balance between energy saving and QoS (quality of services) policies of cloud. A study about power usage of resources in cloud data centers based on workload assign to them, says that an idle server consume near about 50% of its peak utilization power [1]. Therefore, more number of underutilized servers in any cloud data center is responsible to reduce the energy performance tradeoff. To handle this issue, a lots of research proposed as energy efficient algorithms for minimize the consumption of energy and also maintain the SLA (service level agreement) at a satisfactory level. VM (virtual machine) consolidation is one such technique that ensured about the balance of energy based SLA. In the scope of this paper, we explore reinforcement with fuzzy logic (RFL) for VM consolidation to achieve energy based SLA. In this proposed RFL based active VM consolidation, the primary objective is to manage physical server (PS) nodes in order to avoid over-utilized and under-utilized, and to optimize the placement of VMs. A dynamic threshold (based on RFL) is proposed for over-utilized PS detection. For over-utilized PS, a VM selection policy based on fuzzy logic is proposed, which selects VM for migration to maintain the balance of SLA. Additionally, it incorporate VM placement policy through categorization of non-overutilized servers as- balanced, under-utilized and critical. CloudSim toolkit is used to simulate the proposed work on real-world work load traces of CoMon Project define by PlanetLab. Simulation results shows that the proposed policies is most energy efficient compared to others in terms of reduction in both electricity usage and SLA violation.

Growth and Decay of Alpha Tracks in a Large Scale Cloud Chamber after Injection of Radon

  • Wada, Shinichi;Kobayashi, Tsuneo;Katayama, Yoshiro;Iwami, Toshiaki;Kato, Tsuguhisa;Cameron, John R.
    • Proceedings of the Korean Society of Medical Physics Conference
    • /
    • 2002.09a
    • /
    • pp.275-278
    • /
    • 2002
  • The recognition of the natural background radiation is important not only for radiological education but also for the promotion of people's scientific view about radiation. We made a "room" on the web showing natural background radiation as part of a VRM (Virtual Radiation Museum). The "room" shows the video images of the tracks of charged particles from natural background radiation, alpha and beta ray track from known sources using a Large Scale Diffusion Cloud Chamber. The purpose of this study is to make clear the origin of a kind of track (named A-track) which is thick and easy to recognize with the length less than several cm in the cloud chamber, and to make numerical explanation of its counting rate. The study was carried out using a Large Scale Diffusion Cloud Chamber (Phywe, Germany) installed in the Niigata Science Museum. The Model RNC (Pylon Electronics, Canada) was used as Rn-222 source. Ra-226 activity in RNC was 111.6 Bq calibrated with NIST protocol. Rn-222 gas was injected into the cloud chamber. Continuous video recording with use of Digital Handycam (SONY, Japan) was carried out for 360 min. after injection of Rn-222 gas. The number of alpha-ray track (alpha track) in the video images was analyzed. The growth and decay curve of the total activity of Rn-222 and its alpha emitting progeny were calculated and compared with the count of the alpha tracks. As a result the alpha tracks formed by Rn-222 injection resemble A-Tracks. The relationship between A-track in the cloud chamber and atmospheric Rn is discussed.

  • PDF