• Title/Summary/Keyword: cloud part

Search Result 217, Processing Time 0.03 seconds

Evaluation of Geo-based Image Fusion on Mobile Cloud Environment using Histogram Similarity Analysis

  • Lee, Kiwon;Kang, Sanggoo
    • Korean Journal of Remote Sensing
    • /
    • v.31 no.1
    • /
    • pp.1-9
    • /
    • 2015
  • Mobility and cloud platform have become the dominant paradigm to develop web services dealing with huge and diverse digital contents for scientific solution or engineering application. These two trends are technically combined into mobile cloud computing environment taking beneficial points from each. The intention of this study is to design and implement a mobile cloud application for remotely sensed image fusion for the further practical geo-based mobile services. In this implementation, the system architecture consists of two parts: mobile web client and cloud application server. Mobile web client is for user interface regarding image fusion application processing and image visualization and for mobile web service of data listing and browsing. Cloud application server works on OpenStack, open source cloud platform. In this part, three server instances are generated as web server instance, tiling server instance, and fusion server instance. With metadata browsing of the processing data, image fusion by Bayesian approach is performed using functions within Orfeo Toolbox (OTB), open source remote sensing library. In addition, similarity of fused images with respect to input image set is estimated by histogram distance metrics. This result can be used as the reference criterion for user parameter choice on Bayesian image fusion. It is thought that the implementation strategy for mobile cloud application based on full open sources provides good points for a mobile service supporting specific remote sensing functions, besides image fusion schemes, by user demands to expand remote sensing application fields.

Basic Prototype Design and Verification of Hadoop Cluster based on Private Cloud Infrastructure for SMB (중소기업을 위한 프라이빗 클라우드 인프라 기반 하둡 클러스터의 기본 프로토타입 설계 및 실증)

  • Cha, Byung-Rae;Kim, Hyeong-Gyun;Kim, Dae-Gue;Kim, Jong-Won;Kim, Yong-Il
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.2
    • /
    • pp.225-233
    • /
    • 2013
  • Recently, Cloud Computing and Big Data has become a buzzword in the field of IT. In this paper, as part of special efforts to support small businesses (SMB) in these situations, we designed the basic prototypes ver. 0.1, 0.2, and 0.5 for Hadoop cluster based on private cloud infrastructure and implemented the part of basic prototypes. And we verified the performances of the basic prototypes using ASA Dataset.

Study on Housed at Museum of Sun Am Temple (선암사 소장 <용문자수탁의(龍紋刺繡卓衣)> 연구)

  • Sim, Yeon-Ok
    • Journal of the Korean Society of Costume
    • /
    • v.67 no.2
    • /
    • pp.88-100
    • /
    • 2017
  • This study is for the textiles of at Sun Am Temple and characteristic of embroidery. Tak Ui was composed of orange body and green upper cover, and had no strings. The body plate was covered with embroidery, with Gauze base, and upper part was appliqued, by cutting dragon pattern, cloud pattern on satin damask. The thread for embroidery was silk floss, silk twisted thread, rapped gold thread, and rapped silk thread. For padding, it was used cotton thread in the part of dragon's scales. It was used satin stitch, outline stitch, split stitch, couching, and counted stitch, etc. as method of embroidery. In particular, it embroidered counted stitch of diamond shape consecutively on the whole of Tak Ui, it does so with counted stitch of same effect of weaving Brocade in the part of cloud. Besides, it is one of the characteristic for couching rapped silk thread. Such lead embroidery is the popular method in the Ming dynasty of China, in the 16~17 century. The design of Tak Ui is dragon, cloud, and wave in the theme. In the center, 'Seong-su-man-nyeon' was placed on the heads of dragon. This is similar to Dragon Robe of Four-petalled medallion patterns, period of Ming dynasty in China. Therefore, it confirmed that Tak Ui was remodeled the embroidered textiles, made for royal robe, originally, with Tak Ui at temple.

Core Formation in a Turbulent Molecular Cloud

  • Kim, Jong-Soo
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.36 no.2
    • /
    • pp.106.2-106.2
    • /
    • 2011
  • The two competing theories of star formation are based on turbulence and ambipoar diffusion. I will first briefly explain the two theories. There have been analytical (or semi-analytic) models, which estimate star formation rates in a turbulent cloud. Most of them are based on the log-normal density PDF (probability density function) of the turbulent cloud without self-gravity. I will first show that the core (star) formation rate can be increased significantly once self-gravity of a turbulence cloud is taken into account. I will then present the evolution of molecular line profiles of HCO+ and C18O toward a dense core that is forming inside a magnetized turbulent molecular cloud. Features of the profiles can be affected more significantly by coupled velocity and abundance structures in the outer region than those in the inner dense part of the core. During the evolution of the core, the asymmetry of line profiles easily changes from blue to red, and vice versa. Finally, I will introduce a method for incorporating ambipolar diffusion in the strong coupling approximation into a multidimensional magnetohydrodynamic code.

  • PDF

A Study of the Shirt Design Applied with Traditional Cloud Pattern (전통 운문(雲紋)을 모티브로 한 셔츠디자인 연구)

  • Kim, Sun-Young
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.36 no.5
    • /
    • pp.573-582
    • /
    • 2012
  • This work is to develop a T-shirt by adopting a unique cloud pattern (a good auspicious sign as design material) from traditional native Korean patterns for application to various cultural products and textile design cloth patterns; subsequently, a T-shirt design was processed based on this. As a research method, computer design programs Adobe Illustrator CS3 and Adobe Photoshop CS3 were used along with a literature examination as part of motive for design development and pattern realization. Three basic motives were selected as a new formative image in this work, utilizing graphical elements such as abridgement and simplicity of pattern, where flower-shaped cloud pattern, uprising cloud pattern, and 卍-shaped or swastika-shaped pattern of traditional cloud patterns were selected. Each motive diverged into two motives via the shape transformation and the application of different colors. The newly developed basic motive was further processed into a combination of one-time repeat pattern, stripe pattern, and application pattern with mixed cloud motives (that were previously developed), which altogether turned out to be 36 pieces of textile design. In addition, with newly developed motive designs and textile designs, a total of 12 shirt designs for 4 pieces were developed for these three each. The shirt design was developed into a shirt blouse, sleeveless T-shirt, half-sleeve T-shirt, and sports T-shirt among others in order to fit various uses and purposes.

K-Defense Cloud Computing System Design through Cloud Modeling and Analysis of Social Network Service Application (소셜 네트워크 서비스 어플리케이션의 클라우드 모델링 및 분석을 통한 국방 클라우드 컴퓨탱 시스템 설계)

  • Lee, Sung-Tae;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.37-43
    • /
    • 2013
  • In 2010, the Ministry of National Defense decided to build a MegaCenter including the cloud computing technology by 2014, as part of the '2012 Information Service Plan', which is now underway. The Cloud computing system environment should be designed applying cloud computing technology and policy for an efficient infrastructure that many IT resources are available in the data center as a concentrated form. That is, the system should be designed in such a way that clouding services will be efficiently provided to meet the needs of users and there will not be unnecessary waste of resources. However, in order to build an optimal system, it should be possible to predict the service performance and the resource availability at the initial phase of system design. In this paper, using the CloudAnalyst simulator to predict availability of the K-defence cloud computing system service, conducts cloud modeling and analysis of the 'Facebook', one of the most famous social network service applications with most users in the world. An Optimal K-Defense cloud computing design model is proposed through simulation results.

Method to Evaluate and Enhance Reusability of Cloud Services (클라우드 서비스의 재사용성 평가 및 향상 기법)

  • Oh, Sang-Hun;La, Hyun-Jung;Kim, Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.19D no.1
    • /
    • pp.49-62
    • /
    • 2012
  • In cloud computing, service providers develop and deploy services with common and reusable features among various applications, service consumers locate and reuse them in building their applications. Hence, reusability is a key intrinsic characteristic of cloud services. Services with high reusability would yield high return-on-investment. Cloud services have characteristics which do not appear in conventional programming paradigms, existing quality models for software reusability would not applicable to services. In this paper, we propose a reusability evaluation suite for cloud services, which includes quality attributes and metrics. A case study is presented to show its applicability.

Cost-Based Rank Scheduling Algorithm for Multiple Workflow Applications in Cloud Computing (클라우드 컴퓨팅에서 다중 워크플로우 어플리케이션을 위한 비용 기반 랭크 스케줄링 알고리즘)

  • Choe, Gyeong-Geun;Lee, Bong-Hwan
    • The KIPS Transactions:PartA
    • /
    • v.18A no.1
    • /
    • pp.11-18
    • /
    • 2011
  • Cloud computing is a new computing paradigm for sharing resources. Various applications used for cloud services are represented as workflows. These workflow applications must be appropriately allocated to resources or services in cloud. In this paper, a new scheduling algorithm is proposed for multiple workflow applications considering cloud computing environment. The cost-based rank scheduling algorithm considers not only multiple workflow applications, but various QoS metrics for evaluating services. Simulation results show that the proposed algorithm can improve the mean makespan and the availability significantly over two well-known algorithms.

PreBAC: a novel Access Control scheme based Proxy Re-Encryption for cloud computing

  • Su, Mang;Wang, Liangchen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2754-2767
    • /
    • 2019
  • Cloud computing is widely used in information spreading and processing, which has provided a easy and quick way for users to access data and retrieve service. Generally, in order to prevent the leakage of the information, the data in cloud is transferred in the encrypted form. As one of the traditional security technologies, access control is an important part for cloud security. However, the current access control schemes are not suitable for cloud, thus, it is a vital problem to design an access control scheme which should take account of complex factors to satisfy the various requirements for cipher text protection. We present a novel access control scheme based on proxy re-encryption(PRE) technology (PreBAC) for cipher text. It will suitable for the protection of data confidently and information privacy. At first, We will give the motivations and related works, and then specify system model for our scheme. Secondly, the algorithms are given and security of our scheme is proved. Finally, the comparisons between other schemes are made to show the advantages of PreBAC.

Cloud Computing -Virtual Network Related Issues (클라우드 컴퓨팅 - 가상 네트워크 관련 문제)

  • Aazam, Mohammad;Hung, Pham Phuoc;Alsaffar, Aymen Abdullah;Hossain, Al-Amin;Islam, Md. Motaharul;Huh, Eui-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.507-510
    • /
    • 2013
  • Cloud computing is an emerging technology, which allows the user to fulfill his needs by outsourcing the resources. With the passage of time, cloud computing has become an essential part of our lives. But it still requires some sort of standardization, specially in terms of user's trust, privacy, and security related things. This study presents different types of cloud computing services and their working domains along with some key virtualization related issues that are encountered by the cloud service provider as well as the user. Those key issues, related with virtual network are discussed in this paper. This study provides a basis to work further on those issues, so that the key concerns are addressed as soon as possible and cloud computing could become standardized and more prevalent.