• Title/Summary/Keyword: Fog Cloud

Search Result 110, Processing Time 0.165 seconds

Objective Classification of Fog Type and Analysis of Fog Characteristics Using Visibility Meter and Satellite Observation Data over South Korea (시정계와 위성 관측 자료를 활용한 남한 안개의 객관적인 유형 분류와 특성 분석)

  • Lee, Hyun-Kyoung;Suh, Myoung-Seok
    • Atmosphere
    • /
    • v.29 no.5
    • /
    • pp.639-658
    • /
    • 2019
  • The classification of fog type and the characteristics of fog based on fog events over South Korea were investigated using a 3-year (2015~2017) visibility meter data. One-minute visibility meter data were used to identify fog with present weather codes and surface observation data. The concept of fog events was adopted for the better definition of fog properties and more objective classification through the detailed investigation of life cycle of fog. Decision tree method was used to classify the fog types and the final fog types were radiation fog, advection fog, precipitation fog, cloud base lowering fog and morning evaporation fog. We enhanced objectivity in classifying the types of fog by adding the satellite and the buoy observations to the conventional usage of AWS and ceilometer data. Radiation fog, the most common type in South Korea, frequently occurs in inland during autumn. A considerable number of advection fogs occur in island area in summer, especially in July. Precipitation fog accounts for more than a quarter of the total fog events and frequently occurs in islands and coastal areas. Cloud base lowering fog, classified using ceilometer, occurs occasionally for all areas but the occurrence rate is relatively high in east and west coastal area. Morning evaporation fog type is rarely observed in inland. The occurrence rate of thick fog with visibility less than 100 meters is amount to 21% of total fog events. Although advection fog develops into thick fog frequently, radiation fog shows the minimum visibility, in some cases.

Analysis of the Fog Detection Algorithm of DCD Method with SST and CALIPSO Data (SST와 CALIPSO 자료를 이용한 DCD 방법으로 정의된 안개화소 분석)

  • Shin, Daegeun;Park, Hyungmin;Kim, Jae Hwan
    • Atmosphere
    • /
    • v.23 no.4
    • /
    • pp.471-483
    • /
    • 2013
  • Nighttime sea fog detection from satellite is very hard due to limitation in using visible channels. Currently, most widely used method for the detection is the Dual Channel Difference (DCD) method based on Brightness Temperature Difference between 3.7 and 11 ${\mu}m$ channel (BTD). However, this method have difficulty in distinguishing between fog and low cloud, and sometimes misjudges middle/high cloud as well as clear scene as fog. Using CALIPSO Lidar Profile measurements, we have analyzed the intrinsic problems in detecting nighttime sea fog from various satellite remote sensing algorithms and suggested the direction for the improvement of the algorithm. From the comparison with CALIPSO measurements for May-July in 2011, the DCD method excessively overestimates foggy pixels (2542 pixels). Among them, only 524 pixel are real foggy pixels, but 331 pixels and 1687 pixels are clear and other type of clouds, respectively. The 514 of real foggy pixels accounts for 70% of 749 foggy pixels identified by CALIPSO. Our proposed new algorithm detects foggy pixels by comparing the difference between cloud top temperature and underneath sea surface temperature from assimilated data along with the DCD method. We have used two types of cloud top temperature, which obtained from 11 ${\mu}m$ brightness temperature (B_S1) and operational COMS algorithm (B_S2). The detected foggy 1794 pixels from B_S1 and 1490 pixel from B_S2 are significantly reduced the overestimation detected by the DCD method. However, 477 and 446 pixels have been found to be real foggy pixels, 329 and 264 pixels be clear, and 989 and 780 pixels be other type of clouds, detected by B_S1 and B_S2 respectively. The analysis of the operational COMS fog detection algorithm reveals that the cloud screening process was strictly enforced, which resulted in underestimation of foggy pixel. The 538 of total detected foggy pixels obtain only 187 of real foggy pixels, but 61 of clear pixels and 290 of other type clouds. Our analysis suggests that there is no winner for nighttime sea fog detection algorithms, but loser because real foggy pixels are less than 30% among the foggy pixels declared by all algorithms. This overwhelming evidence reveals that current nighttime sea fog algorithms have provided a lot of misjudged information, which are mostly originated from difficulty in distinguishing between clear and cloudy scene as well as fog and other type clouds. Therefore, in-depth researches are urgently required to reduce the enormous error in nighttime sea fog detection from satellite.

Intelligent Resource Management Schemes for Systems, Services, and Applications of Cloud Computing Based on Artificial Intelligence

  • Lim, JongBeom;Lee, DaeWon;Chung, Kwang-Sik;Yu, HeonChang
    • Journal of Information Processing Systems
    • /
    • v.15 no.5
    • /
    • pp.1192-1200
    • /
    • 2019
  • Recently, artificial intelligence techniques have been widely used in the computer science field, such as the Internet of Things, big data, cloud computing, and mobile computing. In particular, resource management is of utmost importance for maintaining the quality of services, service-level agreements, and the availability of the system. In this paper, we review and analyze various ways to meet the requirements of cloud resource management based on artificial intelligence. We divide cloud resource management techniques based on artificial intelligence into three categories: fog computing systems, edge-cloud systems, and intelligent cloud computing systems. The aim of the paper is to propose an intelligent resource management scheme that manages mobile resources by monitoring devices' statuses and predicting their future stability based on one of the artificial intelligence techniques. We explore how our proposed resource management scheme can be extended to various cloud-based systems.

Design and Evaluation of a Fault-tolerant Publish/Subscribe System for IoT Applications (IoT 응용을 위한 결함 포용 발행/구독 시스템의 설계 및 평가)

  • Bae, Ihn-Han
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.8
    • /
    • pp.1101-1113
    • /
    • 2021
  • The rapid growth of sense-and-respond applications and the emerging cloud computing model present a new challenge: providing publish/subscribe middleware as a scalable and elastic cloud service. The publish/subscribe interaction model is a promising solution for scalable data dissemination over wide-area networks. In addition, there have been some work on the publish/subscribe messaging paradigm that guarantees reliability and availability in the face of node and link failures. These publish/subscribe systems are commonly used in information-centric networks and edge-fog-cloud infrastructures for IoT. The IoT has an edge-fog cloud infrastructure to efficiently process massive amounts of sensing data collected from the surrounding environment. In this paper. we propose a quorum-based hierarchical fault-tolerant publish/subscribe systems (QHFPS) to enable reliable delivery of messages in the presence of link and node failures. The QHFPS efficiently distributes IoT messages to the publish/subscribe brokers in fog overlay layers on the basis of proposing extended stepped grid (xS-grid) quorum for providing tolerance when faced with node failures and network partitions. We evaluate the performance of QHFPS in three aspects: number of transmitted Pub/Sub messages, average subscription delay, and subscritpion delivery rate with an analytical model.

Resource Management Strategies in Fog Computing Environment -A Comprehensive Review

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.310-328
    • /
    • 2022
  • Internet of things (IoT) has emerged as the most popular technique that facilitates enhancing humans' quality of life. However, most time sensitive IoT applications require quick response time. So, processing these IoT applications in cloud servers may not be effective. Therefore, fog computing has emerged as a promising solution that addresses the problem of managing large data bandwidth requirements of devices and quick response time. This technology has resulted in processing a large amount of data near the data source compared to the cloud. However, efficient management of computing resources involving balancing workload, allocating resources, provisioning resources, and scheduling tasks is one primary consideration for effective computing-based solutions, specifically for time-sensitive applications. This paper provides a comprehensive review of the source management strategies considering resource limitations, heterogeneity, unpredicted traffic in the fog computing environment. It presents recent developments in the resource management field of the fog computing environment. It also presents significant management issues such as resource allocation, resource provisioning, resource scheduling, task offloading, etc. Related studies are compared indifferent mentions to provide promising directions of future research by fellow researchers in the field.

The Security and Privacy Issues of Fog Computing

  • Sultan Algarni;Khalid Almarhabi;Ahmed M. Alghamdi;Asem Alradadi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.25-31
    • /
    • 2023
  • Fog computing diversifies cloud computing by using edge devices to provide computing, data storage, communication, management, and control services. As it has a decentralised infrastructure that is capable of amalgamating with cloud computing as well as providing real-time data analysis, it is an emerging method of using multidisciplinary domains for a variety of applications; such as the IoT, Big Data, and smart cities. This present study provides an overview of the security and privacy concerns of fog computing. It also examines its fundamentals and architecture as well as the current trends, challenges, and potential methods of overcoming issues in fog computing.

Research on Security Model and Requirements for Fog Computing: Survey (포그 컴퓨팅 보안 모델과 보안 요구사항 연구: 서베이)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.5
    • /
    • pp.27-32
    • /
    • 2018
  • IoT technology is developing with various application areas in $4^{th}$ Industrial revolution. There are many users using the application services. Sensing data from various environment need to be transferred to cloud computing storage and store in the cloud storage. However, physical distance from the end node to cloud computing storage is far away, and it is not efficient to transfer data from sensors and store the sensing data in the cloud storage whenever sensing data happen. Therefore, Fog computing is proposed to solve these problems which can process and store the sensing data. However, Fog computing is new emerging technology, there is no standard security model and requirements. This research proposes to security requirements and security model for Fog computing to establish a secure and efficient cloud computing environment.

Traffic-based reinforcement learning with neural network algorithm in fog computing environment

  • Jung, Tae-Won;Lee, Jong-Yong;Jung, Kye-Dong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.144-150
    • /
    • 2020
  • Reinforcement learning is a technology that can present successful and creative solutions in many areas. This reinforcement learning technology was used to deploy containers from cloud servers to fog servers to help them learn the maximization of rewards due to reduced traffic. Leveraging reinforcement learning is aimed at predicting traffic in the network and optimizing traffic-based fog computing network environment for cloud, fog and clients. The reinforcement learning system collects network traffic data from the fog server and IoT. Reinforcement learning neural networks, which use collected traffic data as input values, can consist of Long Short-Term Memory (LSTM) neural networks in network environments that support fog computing, to learn time series data and to predict optimized traffic. Description of the input and output values of the traffic-based reinforcement learning LSTM neural network, the composition of the node, the activation function and error function of the hidden layer, the overfitting method, and the optimization algorithm.

Dynamic Fog-Cloud Task Allocation Strategy for Smart City Applications

  • Salim, Mikail Mohammed;Kang, Jungho;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.128-130
    • /
    • 2021
  • Smart cities collect data from thousands of IoT-based sensor devices for intelligent application-based services. Centralized cloud servers support application tasks with higher computation resources but introduce network latency. Fog layer-based data centers bring data processing at the edge, but fewer available computation resources and poor task allocation strategy prevent real-time data analysis. In this paper, tasks generated from devices are distributed as high resource and low resource intensity tasks. The novelty of this research lies in deploying a virtual node assigned to each cluster of IoT sensor machines serving a joint application. The node allocates tasks based on the task intensity to either cloud-computing or fog computing resources. The proposed Task Allocation Strategy provides seamless allocation of jobs based on process requirements.

Service Image Placement Mechanism Based on the Logical Fog Network (논리적 포그 네트워크 기반의 서비스 이미지 배치 기법)

  • Choi, Jonghwa;Ahn, Sanghyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.11
    • /
    • pp.250-255
    • /
    • 2020
  • For the resolution of the latency problem of the cloud center-based cloud computing, fog computing was proposed that allows end devices to offload computations to nearby fog nodes. In the fog computing, virtualized service images are placed on fog nodes and, if service images are placed close to end devices, the duplicate service image placement problem may occur. Therefore, in this paper, we propose a service image placement mechanism based on the logical fog network that reduces duplicate service images by considering the pattern of collected service requests. For the performance evaluation of the proposed mechanism, through simulations, we compare ours with the on-demand mechanism placing a service image upon the receipt of a service request. We consider the performance factors like the number of service images, the number of non-accommodated service requests, and the network cost.