• Title/Summary/Keyword: Cloud modeling

Search Result 264, Processing Time 0.021 seconds

A Study on the Effective Preprocessing Methods for Accelerating Point Cloud Registration

  • Chungsu, Jang;Yongmin, Kim;Taehyun, Kim;Sunyong, Choi;Jinwoo, Koh;Seungkeun, Lee
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.1
    • /
    • pp.111-127
    • /
    • 2023
  • In visual slam and 3D data modeling, the Iterative Closest Point method is a primary fundamental algorithm, and many technical fields have used this method. However, it relies on search methods that take a high search time. This paper solves this problem by applying an effective point cloud refinement method. And this paper also accelerates the point cloud registration process with an indexing scheme using the spatial decomposition method. Through some experiments, the results of this paper show that the proposed point cloud refinement method helped to produce better performance.

A Modeling Technique for Development of Mobile App. based on Android (안드로이드 기반의 모바일 앱 개발을 위한 모델링 기법)

  • Cho, Eun-Sook;Kim, Chul-Jin;Lee, Sook-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.8
    • /
    • pp.3999-4005
    • /
    • 2013
  • We forecast that the scale of mobile market will be large scale according to the twenty million times of smart phone's user is arrived. The type of software development is being transferred into mobile-based App. or cloud computing-based service from web-based software. Currently both Google's android and Apple's IOS are known for two prominent platforms. Existing modeling techniques cannot be applied into the case of mobile application which is executed those platforms. Therefore, we suggest a modeling technique that is customized existing modeling techniques into android-based software development. That is, we propose an analysis and design techniques which are needed into android-based mobile smart environment.

Economic Impact of HEMOS-Cloud Services for M&S Support (M&S 지원을 위한 HEMOS-Cloud 서비스의 경제적 효과)

  • Jung, Dae Yong;Seo, Dong Woo;Hwang, Jae Soon;Park, Sung Uk;Kim, Myung Il
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.10
    • /
    • pp.261-268
    • /
    • 2021
  • Cloud computing is a computing paradigm in which users can utilize computing resources in a pay-as-you-go manner. In a cloud system, resources can be dynamically scaled up and down to the user's on-demand so that the total cost of ownership can be reduced. The Modeling and Simulation (M&S) technology is a renowned simulation-based method to obtain engineering analysis and results through CAE software without actual experimental action. In general, M&S technology is utilized in Finite Element Analysis (FEA), Computational Fluid Dynamics (CFD), Multibody dynamics (MBD), and optimization fields. The work procedure through M&S is divided into pre-processing, analysis, and post-processing steps. The pre/post-processing are GPU-intensive job that consists of 3D modeling jobs via CAE software, whereas analysis is CPU or GPU intensive. Because a general-purpose desktop needs plenty of time to analyze complicated 3D models, CAE software requires a high-end CPU and GPU-based workstation that can work fluently. In other words, for executing M&S, it is absolutely required to utilize high-performance computing resources. To mitigate the cost issue from equipping such tremendous computing resources, we propose HEMOS-Cloud service, an integrated cloud and cluster computing environment. The HEMOS-Cloud service provides CAE software and computing resources to users who want to experience M&S in business sectors or academics. In this paper, the economic ripple effect of HEMOS-Cloud service was analyzed by using industry-related analysis. The estimated results of using the experts-guided coefficients are the production inducement effect of KRW 7.4 billion, the value-added effect of KRW 4.1 billion, and the employment-inducing effect of 50 persons per KRW 1 billion.

Services Quality Improvement through Control Management Cloud-Based SLA

  • Abel Adane
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.89-94
    • /
    • 2023
  • Cloud-based technology is used in different organizations around the world for various purposes. Using this technology, the service providers provide the service mainly SaaS, PaaS and while the cloud service consumer consumes the services by paying for the service they used or accessed by the principle of "pay per use". The customer of the services can get any services being at different places or locations using different machines or electronic devices. Under the conditions of being well organized and having all necessary infrastructures, the services can be accessed suitably. The identified problem in this study is that cloud providers control and monitor the system or tools by ignoring the calculation and consideration of various faults made from the cloud provider side during service delivery. There are currently problems with ignoring the consumer or client during the monitoring and mentoring system for cloud services consumed at the customer or client level by SLA provisions. The new framework was developed to address the above-mentioned problems. The framework was developed as a unified modeling language. Eight basic components are used to develop the framework. For this research, the researcher developed a prototype by using a selected cloud tool to simulate and java programming language to write a code as well as MySQL to store data during SLA. The researcher used different criteria to validate the developed framework i.e. to validate SLA that is concerned with a cloud service provider, validate what happened when the request from the client-side is less than what is specified in SLA and above what is specified in SLA as well as implementing the monitoring mechanism using the developed Monitoring component. The researcher observed that with the 1st and 3rd criteria the service level agreement was violated and this indicated that if the Service level agreement is monitored or managed only by cloud service prover, there is a violation of LSA. Therefore, the researcher recommended that the service level agreement be managed by both cloud service providers and service consumers in the cloud computing environment.

Kubernetes of cloud computing based on STRIDE threat modeling (STRIDE 위협 모델링에 기반한 클라우드 컴퓨팅의 쿠버네티스(Kubernetes)의 보안 요구사항에 관한 연구)

  • Lee, Seungwook;Lee, Jaewoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.7
    • /
    • pp.1047-1059
    • /
    • 2022
  • With the development of cloud computing technology, container technology that provides services based on a virtual environment is also developing. Container orchestration technology is a key element for cloud services, and it has become an important core technology for building, deploying, and testing large-scale containers with automation. Originally designed by Google and now managed by the Linux Foundation, Kubernetes is one of the container orchestrations and has become the de facto standard. However, despite the increasing use of Kubernetes in container orchestration, the number of incidents due to security vulnerabilities is also increasing. Therefore, in this paper, we study the vulnerabilities of Kubernetes and propose a security policy that can consider security from the initial development or design stage through threat analysis. In particular, we intend to present a specific security guide by classifying security threats by applying STRIDE threat modeling.

The Role of Organizational Members in Implementing and Achieving Successful Cloud Computing: The Moderating Effects of Leadership and Continuous Supports (성공적인 클라우드 컴퓨팅 구현과 성과를 높이기 위한 조직 구성원의 역할: 리더십과 지속적 지원의 조절효과)

  • Kim, Sanghyun;Park, Hyunsun
    • The Journal of Information Systems
    • /
    • v.29 no.2
    • /
    • pp.197-220
    • /
    • 2020
  • Purpose Cloud computing that provides a new paradigm for a firm's use of information technology is getting a lot of attentions by practitioners. However, the empirical investigation on members of organizations using cloud computing are insufficient. Therefore, this study aims to examine the capabilities and perceptions of organizational members that should be considered important for successful cloud computing implementation. Design/methodology/approach This study proposed factors related to the capabilities and perceptions of members of the organization, and examined the relationship between these factors and successful cloud computing implementation and performance. In addition, this study tested the moderating effect of leadership and continuous supports through empirical analysis. The proposed hypotheses were verified through structural equation modeling using SmartPLS3.0 with the collected data. Findings The results showed that four factors except 'member behavior control' had a positive effect on successful cloud computing implementation, which had a positive effect on performance. In addition, leadership and organizational continuous support have been shown to strengthen the relationship among factors.

BIM Platform Resource Management for BaaS(BIM as a Service) in Distributed Cloud Computing (BaaS(BIM as a Service)를 위한 분산 클라우드 기반의 BIM 플랫폼 리소스 관리 방법 연구)

  • Son, A-Young;Shin, Jae-Young;Moon, Hyoun-Seok
    • Journal of KIBIM
    • /
    • v.10 no.3
    • /
    • pp.43-53
    • /
    • 2020
  • BIM-based Cloud platform gained popularity coupled with the convergence of Fourth Industrial Revolution technology. However, most of the previous work has not guaranteed sufficient efficiency to meet user requirements according to BIM service. Furthermore, the Cloud environment is only used as a server and it does not consider cloud characteristics. For the processing of High Capacity Data like BIM and using seamless BIM service, Resource management technology is required in the cloud environment. In this paper, to solve the problems, we propose a BIM platform for BaaS and an efficient resource allocation scheme. We also proved the efficiency of resource for the proposed scheme by using existing schemes. By doing this, the proposed scheme looks forward to accelerating the growth of the BaaS through improving the user experience and resource efficiency.

A Study on the Assimilation of High-Resolution Microwave Humidity Sounder Data for Convective Scale Model at KMA (국지예보모델에서 고해상도 마이크로파 위성자료(MHS) 동화에 관한 연구)

  • Kim, Hyeyoung;Lee, Eunhee;Lee, Seung-Woo;Lee, Yong Hee
    • Atmosphere
    • /
    • v.28 no.2
    • /
    • pp.163-174
    • /
    • 2018
  • In order to assimilate MHS satellite data into the convective scale model at KMA, ATOVS data are reprocessed to utilize the original high-resolution data. And then to improve the preprocessing experiments for cloud detection were performed and optimized to convective-scale model. The experiment which is land scattering index technique added to Observational Processing System to remove contaminated data showed the best result. The analysis fields with assimilation of MHS are verified against with ECMWF analysis fields and fit to other observations including Sonde, which shows improved results on relative humidity fields at sensitive level (850-300 hPa). As the relative humidity of upper troposphere increases, the bias and RMSE of geopotential height are decreased. This improved initial field has a very positive effect on the forecast performance of the model. According to improvement of model field, the Equitable Threat Score (ETS) of precipitation prediction of $1{\sim}20mm\;hr^{-1}$ was increased and this impact was maintained for 27 hours during experiment periods.

A Digital Forensic Framework Design for Joined Heterogeneous Cloud Computing Environment

  • Zayyanu Umar;Deborah U. Ebem;Francis S. Bakpo;Modesta Ezema
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.207-215
    • /
    • 2024
  • Cloud computing is now used by most companies, business centres and academic institutions to embrace new computer technology. Cloud Service Providers (CSPs) are limited to certain services, missing some of the assets requested by their customers, it means that different clouds need to interconnect to share resources and interoperate between them. The clouds may be interconnected in different characteristics and systems, and the network may be vulnerable to volatility or interference. While information technology and cloud computing are also advancing to accommodate the growing worldwide application, criminals use cyberspace to perform cybercrimes. Cloud services deployment is becoming highly prone to threats and intrusions. The unauthorised access or destruction of records yields significant catastrophic losses to organisations or agencies. Human intervention and Physical devices are not enough for protection and monitoring of cloud services; therefore, there is a need for more efficient design for cyber defence that is adaptable, flexible, robust and able to detect dangerous cybercrime such as a Denial of Service (DOS) and Distributed Denial of Service (DDOS) in heterogeneous cloud computing platforms and make essential real-time decisions for forensic investigation. This paper aims to develop a framework for digital forensic for the detection of cybercrime in a joined heterogeneous cloud setup. We developed a Digital Forensics model in this paper that can function in heterogeneous joint clouds. We used Unified Modeling Language (UML) specifically activity diagram in designing the proposed framework, then for deployment, we used an architectural modelling system in developing a framework. We developed an activity diagram that can accommodate the variability and complexities of the clouds when handling inter-cloud resources.

An Application and Error Hooking running on Nested Session Management of Cloud Computing Collaboration Environment (클라우드 컴퓨팅 공동 환경의 네스티드 세션관리에서의 응용 및 오류 훅킹)

  • Ko, Eung-Nam
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.145-150
    • /
    • 2012
  • This paper explains a performance analysis of an error detection system running on nested session management of cloud computing collaboration environment using rule-based DEVS modeling and simulation techniques. In DEVS, a system has a time base, inputs, states, outputs, and functions. This paper explains the design and implementation of the FDA(Fault Detection Agent). FDA is a system that is suitable for detecting software error for multimedia remote control based on nested session management of cloud computing collaboration environment.