• Title/Summary/Keyword: Cluster-based schemes

Search Result 82, Processing Time 0.02 seconds

Grouping Method based on Adaptive Load Balancing for the Intelligent Resource Management of a Cloud System (클라우드 시스템의 지능적인 자원관리를 위한 적응형 부하균형 기반 그룹화 기법)

  • Mateo, Romeo Mark A.;Yang, Hyun-Ho;Lee, Jae-Wan
    • Journal of Internet Computing and Services
    • /
    • v.12 no.3
    • /
    • pp.37-47
    • /
    • 2011
  • Current researches in the Cloud focus on the appropriate interactions of cloud components in a large-scale system implementation. However, the current designs do not include intelligent methods like grouping the similar service providers based on their properties and integrating adaptive schemes for load distribution which can promote effective sharing of resource. This paper proposes an efficient virtualization of services by grouping the cloud providers to improve the service provisioning. The grouping of cloud service providers based on a cluster analysis collects the similar and related services in one group. The adaptive load balancing supports the service provisioning of the cloud system where it manages the load distribution within the group using an adaptive scheme. The proposed virtualization mechanism (GRALB) showed good results in minimizing message overhead and throughput performance compared to other methods.

Analysis on Security Vulnerabilities of a Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks (계층적 무선 센서 네트워크를 위한 패스워드 기반 사용자 인증 스킴의 보안 취약점 분석)

  • Joo, Young-Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.63-70
    • /
    • 2015
  • The numerous improved schemes of user authentication based on password have been proposed in order to prevent the data access from the unauthorized person. The importance of user authentication has been remarkably growing in the expanding application areas of wireless sensor networks. Recently, emerging wireless sensor networks possesses a hierarchy among the nodes which are divided into cluster heads and sensor nodes. Such hierarchical wireless sensor networks have more operational advantages by reducing the energy consumption and traffic load. In 2012, Das et al. proposed a user authentication scheme to be applicable for the hierarchical wireless sensor networks. Das et al. claimed that their scheme is effectively secure against the various security flaws. In this paper, author will prove that Das et al.'s scheme is still vulnerable to man-in-the-middle attack, password guessing/change attack and does not support mutual authentication between the user and the cluster heads.

An Efficient Real-Time Image Reconstruction Scheme using Network m Multiple View and Multiple Cluster Environments (다시점 및 다중클러스터 환경에서 네트워크를 이용한 효율적인 실시간 영상 합성 기법)

  • You, Kang-Soo;Lim, Eun-Cheon;Sim, Chun-Bo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2251-2259
    • /
    • 2009
  • We propose an algorithm and system which generates 3D stereo image by composition of 2D image from 4 multiple clusters which 1 cluster was composed of 4 multiple cameras based on network. Proposed Schemes have a network-based client-server architecture for load balancing of system caused to process a large amounts of data with real-time as well as multiple cluster environments. In addition, we make use of JPEG compression and RAM disk method for better performance. Our scheme first converts input images from 4 channel, 16 cameras to binary image. And then we generate 3D stereo images after applying edge detection algorithm such as Sobel algorithm and Prewiit algorithm used to get disparities from images of 16 multiple cameras. With respect of performance results, the proposed scheme takes about 0.05 sec. to transfer image from client to server as well as 0.84 to generate 3D stereo images after composing 2D images from 16 multiple cameras. We finally confirm that our scheme is efficient to generate 3D stereo images in multiple view and multiple clusters environments with real-time.

Analyzing College Students' Dialogic Argumentation in the Context of Nanotechnology Issues Based on Idiocentrism and Allocentrism (나노기술 관련 사회·윤리적 쟁점 맥락에서 개인-집단중심성향에 따른 대학생들의 논증담화 분석)

  • Ko, Yeonjoo;Lee, Hyunju
    • Journal of the Korean Chemical Society
    • /
    • v.64 no.5
    • /
    • pp.291-303
    • /
    • 2020
  • This study aimed to explore the patterns of college students' dialogic argumentation in the context of nanotechnology issues, and to compare these patterns based on their idiocentrism and allocentrism. Nanotechnology represents the characteristics of socioscientific issues in that it is widely used in various fields, but at the same time, it includes the likelihood of negative effects. 33 college students who enrolled in science-related course participated in this study. Participants were divided into idiocentric groups and allocentric groups based on the INDCOL scores, and they participated in group discussions on nanotechnology. All discussions were audiotaped and analyzed using the framework of discourse clusters and schemes. Results showed that participating students engaged in dialogic argumentation with the process of exchanging of individual perspectives, exploration of different perspectives, and coordination and negotiation; specifically, they spent most of their time in exploring different values and perspectives regarding nanotechnology. Results also indicated the differences in discourse clusters and discourse schemes between idiocentric and allocentric groups. Allocentric groups more often negotiated to settle on a group decision than idiocentric groups did, and discourse schemes in their negotiation process were slightly different from the ones in idiocentric groups.

A Biometric-based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks

  • Chen, Ying;Ge, Yangming;Wang, Wenyuan;Yang, Fengyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1779-1798
    • /
    • 2018
  • Heterogeneous wireless sensor networks (HEWSN) is a kind of wireless sensor networks (WSN), each sensor may has different attributes, HEWSN has been widely used in many aspects. Due to sensors are deployed in unattended environments and its resource constrained feature, the design of security and efficiency balanced authentication scheme for HEWSN becomes a vital challenge. In this paper, we propose a secure and lightweight user authentication and key agreement scheme based on biometric for HEWSN. Firstly, fuzzy extractor is adopted to handle the user's biometric information. Secondly, we achieve mutual authentication and key agreement among three entities, which are user, gateway and cluster head in the four phases. Finally, formal security analysis shows that the proposed scheme defends against various security pitfalls. Additionally, comparison results with other surviving relevant schemes show that our scheme is more efficient in term of computational cost, communication cost and estimated time. Therefore, the proposed scheme is well suitable for practical application in HEWSN.

MDP-Based Stepwise Network Reconfiguration Scheme for Dynamic WDM Network (동적 WDM네트워크를 위한 MDP기반의 단계적 망 재구성 기법)

  • Park, Byoung-Seob
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.160-168
    • /
    • 2008
  • We completed a new cluster system based on WDM by proposing virtual topology reconfiguration schemes. The key idea of the proposed scheme Is to construct a set with the longest chains of requests of connecting nodes which need to be assigned a wavelength. All the sets have no common factor, that is, there is no duplicated link among the requests of connecting. After making the set satisfying this condition, we could assign a wavelength to per corresponding set. We could reconfigure a virtual topology with this scheme collectively. we compared our scheme to existing approaches by the OWns simulation tool. As the results, we gained improved performances, reducing 10% of blocking rate and improving 30% of ADM utilization in terms of the blocking probability and the ADM utilization.

Classification of Convective/Stratiform Radar Echoes over a Summer Monsoon Front, and Their Optimal Use with TRMM PR Data

  • Oh, Hyun-Mi;Heo, Ki-Young;Ha, Kyung-Ja
    • Korean Journal of Remote Sensing
    • /
    • v.25 no.6
    • /
    • pp.465-474
    • /
    • 2009
  • Convective/stratiform radar echo classification schemes by Steiner et al. (1995) and Biggerstaff and Listemaa (2000) are examined on a monsoonal front during the summer monsoon-Changma period, which is organized as a cloud cluster with mesoscale convective complex. Target radar is S-band with wavelength of 10cm, spatial resolution of 1km, elevation angle interval of 0.5-1.0 degree, and minimum elevation angle of 0.19 degree at Jindo over the Korean Peninsula. For verification of rainfall amount retrieved from the echo classification, ground-based rain gauge observations (Automatic Weather Stations) are examined, converting the radar echo grid data to the station values using the inverse distance weighted method. Improvement from the echo classification is evaluated based on the correlation coefficient and the scattered diagram. Additionally, an optimal use method was designed to produce combined rainfalls from the radar echo and Tropical Rainfall Measuring Mission Precipitation Radar (TRMM/PR) data. Optimal values for the radar rain and TRMM/PR rain are inversely weighted according to the error variance statistics for each single station. It is noted how the rainfall distribution during the summer monsoon frontal system is improved from the classification of convective/stratiform echo and the use of the optimal use technique.

Development of an Analytical Framework for Dialogic Argumentation in the Context of Socioscientific Issues: Based on Discourse Clusters and Schemes (과학관련 사회쟁점(SSI) 맥락에서의 소집단 논증활동 분석틀 개발: 담화클러스터와 담화요소의 분석)

  • Ko, Yeonjoo;Choi, Yunhee;Lee, Hyunju
    • Journal of The Korean Association For Science Education
    • /
    • v.35 no.3
    • /
    • pp.509-521
    • /
    • 2015
  • Argumentation is a social and collaborative dialogic process. A large number of researchers have focused on analyzing the structure of students' argumentation occurring in the scientific inquiry context, using the Toulmin's model of argument. Since SSI dialogic argumentation often presents distinctive features (e.g. interdisciplinary, controversial, value-laden, etc.), Toulmin's model would not fit into the context. Therefore, we attempted to develop an analytical framework for SSI dialogic argumentation by addressing the concepts of 'discourse clusters' and 'discourse schemes.' Discourse clusters indicated a series of utterances created for a similar dialogical purpose in the SSI contexts. Discourse schemes denoted meaningful discourse units that well represented the features of SSI reasoning. In this study, we presented six types of discourse clusters and 19 discourse schemes. We applied the framework to the data of students' group discourse on SSIs (e.g. euthanasia, nuclear energy, etc.) in order to verify its validity and applicability. The results indicate that the framework well explained the overall flow, dynamics, and features of students' discourse on SSI.

A Sensing Channel Scheduling Scheme for Improving the Cognition Ability in Cognitive Radio Systems (인지 라디오 시스템에서 주파수 상황인지 능력 향상을 위한 감지 채널 스케줄링 기법)

  • Han, Jeong-Ae;Jeon, Wha-Sook
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.2
    • /
    • pp.130-138
    • /
    • 2008
  • The scheme for recognizing the channel availability is one of the most important research issues in cognitive radio systems utilizing unused frequency bands. In this paper, we propose a novel scheme of selecting sensing channel in order to improve the sensing ability of frequency status in cognitive radio ad hoc networks. To fully exploit the sensing ability of each cognitive radio user, we adopt a master for a cluster which is made of several cognitive radio users. By gathering and analyzing the sensing information from cognitive radio users in the cluster, the cooperative sensing is realized. Since the transmission range of a licensed user is limited, it is possible that a master determines different sensing channels to each cognitive radio users based on their location. By making cognitive radio users sense different channels, the proposed scheme can recognize the state of wireless spectrum fast and precisely. Using the simulation, we compare the performance of the proposed scheme with those of two different compared schemes that one makes cognitive radio users recognize the frequency status based on their own sensing results and the other shares frequency status information but does not utilize the location information of licensed user. Simulation results show that the proposed scheme provides available channels as many as possible while detecting the activation of licensed user immediately.

A Clustering Scheme Considering the Structural Similarity of Metadata in Smartphone Sensing System (스마트폰 센싱에서 메타데이터의 구조적 유사도를 고려한 클러스터링 기법)

  • Min, Hong;Heo, Junyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.229-234
    • /
    • 2014
  • As association between sensor networks that collect environmental information by using numberous sensor nodes and smartphones that are equipped with various sensors, many applications understanding users' context have been developed to interact users and their environments. Collected data should be stored with XML formatted metadata containing semantic information to share the collected data. In case of distance based clustering schemes, the efficiency of data collection decreases because metadata files are extended and changed as the purpose of each system developer. In this paper, we proposed a clustering scheme considering the structural similarity of metadata to reduce clustering construction time and improve the similarity of metadata among member nodes in a cluster.