• Title/Summary/Keyword: hybrid cloud

Search Result 111, Processing Time 0.023 seconds

Evaluation for Space Distribution of Dust Cloud in Hybrid Mixtures (이상계 혼합기에서의 분진운의 공간분포에 대한 평가)

  • 한우섭;정국삼
    • Journal of the Korean Society of Safety
    • /
    • v.10 no.1
    • /
    • pp.35-40
    • /
    • 1995
  • This study dealed with problem to estimate the uniformity of dust clouds, as a fundamental study to estimate the ignition hazardous evaluation of hybrid mixtures. The developed method was proposed to grasp space distribution of dusts, and also, an experimental apparatus considering with dispersion and reproduction of dusts were uniquely devised and studied.

  • PDF

Study on Weather Modification Hybrid Rocket Experimental Design and Application (기상조절용 하이브리드 로켓의 실험 설계 및 활용연구)

  • Joo Wan Cha;Bu-Yo Kim;Miloslav Belorid;Yonghun Ro;A-Reum Ko;Sun Hee Kim;Dong-Ho Park;Ji Man Park;Hae Jung Koo;Ki-Ho Chang;Hong Hee Lee;Soojong Kim
    • Atmosphere
    • /
    • v.34 no.2
    • /
    • pp.203-216
    • /
    • 2024
  • The National Institute of Meteorological Sciences in Korea has developed the Weather Modification Hybrid Rocket (WMHR), an advanced system that offers enhanced stability and cost-effectiveness over conventional solid-fuel rockets. Designed for precise operation, the WMHR enables accurate control over the ejection altitude of pyrotechnics by modulating the quantity of oxidizer, facilitating specific cloud seeding at various atmospheric layers. Furthermore, the rate of descent for pyrotechnic devices can be adjusted by modifying parachute sizes, allowing for controlled dispersion time and concentration of seeding agents. The rocket's configuration also supports adjustments in the pyrotechnic device's capacity, permitting tailored seeding agent deployment. This innovation reflects significant technical progression and collaborations with local manufacturers, in addition to efforts to secure testing sites and address hybrid rocket production challenges. Notable outcomes of this project include the creation of a national framework for weather modification technology utilizing hybrid rockets, enhanced cloud seeding methods, and the potential for broader meteorological application of hybrid rockets beyond precipitation augmentation. An illustrative case study confirmed the WMHR's operational effectiveness, although the impact on cloud seeding was limited by unfavorable weather conditions. This experience has provided valuable insights and affirmed the system's potential for varied uses, such as weather modification and deploying high-altitude meteorological sensors. Nevertheless, the expansion of civilian weather rocket experiments in Korea faces challenges due to inadequate infrastructure and regulatory limitations, underscoring the urgent need for advancements in these areas.

Hybrid Operational Concept with Chemical Detection UAV and Stand-off Chemical Detector for Toxic Chemical Cloud Detection (화학오염운 탐지를 위한 접촉식 화학탐지기를 탑재한 무인기와 원거리 화학탐지기의 복합 운용개념 고찰)

  • Lee, Myeongjae;Chong, Eugene;Jeong, Young-Su;Lee, Jae-Hwan;Nam, Hyunwoo;Park, Myung-Kyu
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.3
    • /
    • pp.302-309
    • /
    • 2020
  • Early-detection and monitoring of toxic chemical gas cloud with chemical detector is essential for reducing the number of casualties. Conventional method for chemical detection and reconnaissance has the limitation in approaching to chemically contaminated site and prompt understanding for the situation. Stand-off detector can detect and identify the chemical gas at a long distance but it cannot know exact distance and position. Chemical detection UAV is an emerging platform for its high mobility and operation safety. In this study, we have conducted chemical gas cloud detection with the stand-off chemical detector and the chemical detection UAV. DMMP vapor was generated in the area where the cloud can be detected through the field of view(FOV) of stand-off chemical detector. Monitoring the vapor cloud with standoff detector, the chemical detection UAV moved back and forth at the area DMMP vapor being generated to detect the chemical contamination. The hybrid detection system with standoff cloud detection and point detection by chemical sensors with UAV seems to be very efficient as a new concept of chemical detection.

A Study on Decision Making Factors of Cloud Computing Adoption Using BCOR Approach (BCOR 접근법을 이용한 클라우드 컴퓨팅 도입의 의사결정 요인에 관한 연구)

  • Lee, Young-Chan;Hanh, Tang Nguyen
    • Journal of Information Technology Services
    • /
    • v.11 no.1
    • /
    • pp.155-171
    • /
    • 2012
  • With the continuous and outstanding development of information technology(IT), human being is coming to the new computing era which is called cloud computing. This era brings lots of huge benefits also at the same time release the resources of IT infrastructure and data boom for man. In the future no longer, most of IT service providers, enterprises, organizations and systems will adopt this new computing model. There are three main deployment models in cloud computing including public cloud, private cloud and hybrid cloud; each one also has its own cons and pros. While implementing any kind of cloud services, customers have to choose one of three above deployment models. Thus, our paper aims to represent a practical framework to help the adopter select which one will be the best suitable deployment model for their requirements by evaluating each model comprehensively. The framework is built by applying the analytic hierarchy process(AHP), namely benefit-cost-opportunity-risk(BCOR) model as a powerful and effective tool to serve the problem. The gained results hope not only to provide useful information for the readers but also to contribute valuable knowledge to this new area. In addition, it might support the practitioners' effective decision making process in case they meet the same issue and have a positive influence on the increase of right decision for the organization.

A Cloud Workflow Model Based on the Information Control Net (정보제어넷 기반 클라우드 워크플로우 모델)

  • Sun, Kai;Ahn, Hyun;Kim, Kwanghoon Pio
    • Journal of Internet Computing and Services
    • /
    • v.19 no.3
    • /
    • pp.25-33
    • /
    • 2018
  • This paper proposes a cloud workflow model theoretically supported by the information control net modeling methodology as a cloud workflow modeling methodology that is mandatory in implementing realtime enterprise workflow management systems running with cloud computing environments. The eventual goal of the cloud workflow model proposed in this paper is to support those cloud workflow architectures reflecting the types of cloud deployment models such as private, community, public, and hybrid cloud deployment models. Moreover, the proposed model is a mathematical graph model that is extended from the information control net modeling methodology used in conventional enterprise workflow modeling, and it aims to theoretically couple this methodology with the cloud deployment models. Finally, this paper tries to verify the feasibility of the proposed model by building a possible cloud workflow architecture and its cloud workflow services on a realtime enterpeise cloud workflow management system.

IBC-Based Entity Authentication Protocols for Federated Cloud Systems

  • Cao, Chenlei;Zhang, Ru;Zhang, Mengyi;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1291-1312
    • /
    • 2013
  • Cloud computing changes the service models of information systems and accelerates the pace of technological innovation of consumer electronics. However, it also brings new security issues. As one of the important foundations of various cloud security solutions, entity authentication is attracting increasing interest of many researchers. This article proposes a layered security architecture to provide a trust transmission mechanism among cloud systems maintained by different organizations. Based on the security architecture, four protocols are proposed to implement mutual authentication, data sharing and secure data transmission in federated cloud systems. The protocols not only can ensure the confidentiality of the data transferred, but also resist man-in-the-middle attacks and masquerading attacks. Additionally, the security properties of the four protocols have been proved by S-pi calculus formal verification. Finally, the performance of the protocols is investigated in a lab environment and the feasibility of the security architecture has been verified under a hybrid cloud system.

A Task Scheduling Strategy in Cloud Computing with Service Differentiation

  • Xue, Yuanzheng;Jin, Shunfu;Wang, Xiushuang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5269-5286
    • /
    • 2018
  • Task scheduling is one of the key issues in improving system performance and optimizing resource management in cloud computing environment. In order to provide appropriate services for heterogeneous users, we propose a novel task scheduling strategy with service differentiation, in which the delay sensitive tasks are assigned to the rapid cloud with high-speed processing, whereas the fault sensitive tasks are assigned to the reliable cloud with service restoration. Considering that a user can receive service from either local SaaS (Software as a Service) servers or public IaaS (Infrastructure as a Service) cloud, we establish a hybrid queueing network based system model. With the assumption of Poisson arriving process, we analyze the system model in steady state. Moreover, we derive the performance measures in terms of average response time of the delay sensitive tasks and utilization of VMs (Virtual Machines) in reliable cloud. We provide experimental results to validate the proposed strategy and the system model. Furthermore, we investigate the Nash equilibrium behavior and the social optimization behavior of the delay sensitive tasks. Finally, we carry out an improved intelligent searching algorithm to obtain the optimal arrival rate of total tasks and present a pricing policy for the delay sensitive tasks.

VDI Performance Optimization with Hybrid Parallel Processing in Thick Client System under Heterogeneous Multi-Core Environment (Heterogeneous 멀티 코어 환경의 Thick Client에서 VDI 성능 최적화를 위한 혼합 병렬 처리 기법 연구)

  • Kim, Myeong-Seob;Huh, Eui-Nam
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.3
    • /
    • pp.163-171
    • /
    • 2013
  • Recently, the requirement of processing High Definition (HD) video or 3D application on low, mobile devices has been expanded and content data has been increased as well. It is becoming a major issue in Cloud computing where a Virtual Desktop Infrastructure (VDI) Service needs efficient data processing ability to provide Quality of Experience (QoE) in Cloud computing. In this paper, we propose three kind of Thick-Thin VDI Service which can share and delegate VDI service based on Thick Client using CPU and GPU. Furthermore, we propose and discuss the VDI Service Optimization Method in mixed CPU and GPU Heterogeneous Environment using CPU Parallel Processing OpenMP and GPU Parallel Processing CUDA.

An integrated method of flammable cloud size prediction for offshore platforms

  • Zhang, Bin;Zhang, Jinnan;Yu, Jiahang;Wang, Boqiao;Li, Zhuoran;Xia, Yuanchen;Chen, Li
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.13 no.1
    • /
    • pp.321-339
    • /
    • 2021
  • Response Surface Method (RSM) has been widely used for flammable cloud size prediction as it can reduce computational intensity for further Explosion Risk Analysis (ERA) especially during the early design phase of offshore platforms. However, RSM encounters the overfitting problem under very limited simulations. In order to overcome the disadvantage of RSM, Bayesian Regularization Artificial Neural (BRANN)-based model has been recently developed and its robustness and efficiency have been widely verified. However, for ERA during the early design phase, there seems to be room to further reduce the computational intensity while ensuring the model's acceptable accuracy. This study aims to develop an integrated method, namely the combination of Center Composite Design (CCD) method with Bayesian Regularization Artificial Neural Network (BRANN), for flammable cloud size prediction. A case study with constant and transient leakages is conducted to illustrate the feasibility and advantage of this hybrid method. Additionally, the performance of CCD-BRANN is compared with that of RSM. It is concluded that the newly developed hybrid method is more robust and computational efficient for ERAs during early design phase.

Enhancing cloud computing security: A hybrid machine learning approach for detecting malicious nano-structures behavior

  • Xu Guo;T.T. Murmy
    • Advances in nano research
    • /
    • v.15 no.6
    • /
    • pp.513-520
    • /
    • 2023
  • The exponential proliferation of cutting-edge computing technologies has spurred organizations to outsource their data and computational needs. In the realm of cloud-based computing environments, ensuring robust security, encompassing principles such as confidentiality, availability, and integrity, stands as an overarching imperative. Elevating security measures beyond conventional strategies hinges on a profound comprehension of malware's multifaceted behavioral landscape. This paper presents an innovative paradigm aimed at empowering cloud service providers to adeptly model user behaviors. Our approach harnesses the power of a Particle Swarm Optimization-based Probabilistic Neural Network (PSO-PNN) for detection and recognition processes. Within the initial recognition module, user behaviors are translated into a comprehensible format, and the identification of malicious nano-structures behaviors is orchestrated through a multi-layer neural network. Leveraging the UNSW-NB15 dataset, we meticulously validate our approach, effectively characterizing diverse manifestations of malicious nano-structures behaviors exhibited by users. The experimental results unequivocally underscore the promise of our method in fortifying security monitoring and the discernment of malicious nano-structures behaviors.