• Title/Summary/Keyword: hybrid cloud

Search Result 112, Processing Time 0.022 seconds

An Improved Hybrid Canopy-Fuzzy C-Means Clustering Algorithm Based on MapReduce Model

  • Dai, Wei;Yu, Changjun;Jiang, Zilong
    • Journal of Computing Science and Engineering
    • /
    • v.10 no.1
    • /
    • pp.1-8
    • /
    • 2016
  • The fuzzy c-means (FCM) is a frequently utilized algorithm at present. Yet, the clustering quality and convergence rate of FCM are determined by the initial cluster centers, and so an improved FCM algorithm based on canopy cluster concept to quickly analyze the dataset has been proposed. Taking advantage of the canopy algorithm for its rapid acquisition of cluster centers, this algorithm regards the cluster results of canopy as the input. In this way, the convergence rate of the FCM algorithm is accelerated. Meanwhile, the MapReduce scheme of the proposed FCM algorithm is designed in a cloud environment. Experimental results demonstrate the hybrid canopy-FCM clustering algorithm processed by MapReduce be endowed with better clustering quality and higher operation speed.

Multi-level Scheduling Algorithm Based on Storm

  • Wang, Jie;Hang, Siguang;Liu, Jiwei;Chen, Weihao;Hou, Gang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1091-1110
    • /
    • 2016
  • Hybrid deployment under current cloud data centers is a combination of online and offline services, which improves the utilization of the cluster resources. However, the performance of the cluster is often affected by the online services in the hybrid deployment environment. To improve the response time of online service (e.g. search engine), an effective scheduling algorithm based on Storm is proposed. At the component level, the algorithm dispatches the component with more influence to the optimal performance node. Inside the component, a reasonable resource allocation strategy is used. By searching the compressed index first and then filtering the complete index, the execution speed of the component is improved with similar accuracy. Experiments show that our algorithm can guarantee search accuracy of 95.94%, while increasing the response speed by 68.03%.

Data-Driven-Based Beam Selection for Hybrid Beamforming in Ultra-Dense Networks

  • Ju, Sang-Lim;Kim, Kyung-Seok
    • International journal of advanced smart convergence
    • /
    • v.9 no.2
    • /
    • pp.58-67
    • /
    • 2020
  • In this paper, we propose a data-driven-based beam selection scheme for massive multiple-input and multiple-output (MIMO) systems in ultra-dense networks (UDN), which is capable of addressing the problem of high computational cost of conventional coordinated beamforming approaches. We consider highly dense small-cell scenarios with more small cells than mobile stations, in the millimetre-wave band. The analog beam selection for hybrid beamforming is a key issue in realizing millimetre-wave UDN MIMO systems. To reduce the computation complexity for the analog beam selection, in this paper, two deep neural network models are used. The channel samples, channel gains, and radio frequency beamforming vectors between the access points and mobile stations are collected at the central/cloud unit that is connected to all the small-cell access points, and are used to train the networks. The proposed machine-learning-based scheme provides an approach for the effective implementation of massive MIMO system in UDN environment.

Hybrid Memory Adaptor for OpenStack Swift Object Storage (OpenStack Swift 객체 스토리지를 위한 하이브리드 메모리 어댑터 설계)

  • Yoon, Su-Kyung;Nah, Jeong Eun
    • Journal of the Semiconductor & Display Technology
    • /
    • v.19 no.3
    • /
    • pp.61-67
    • /
    • 2020
  • This paper is to propose a hybrid memory adaptor using next-generation nonvolatile memory devices such as phase-change memory to improve the performance limitations of OpenStack-based object storage systems. The proposed system aims to improve the performance of the account and container servers for object metadata management. For this, the proposed system consists of locality-based dynamic page buffer, write buffer, and nonvolatile memory modules. Experimental results show that the proposed system improves the hit rate by 5.5% compared to the conventional system.

Design and Evaluation of an Edge-Fog Cloud-based Hierarchical Data Delivery Scheme for IoT Applications (사물인터넷 응용을 위한 에지-포그 클라우드 기반 계층적 데이터 전달 방법의 설계 및 평가)

  • Bae, Ihn-Han
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.37-47
    • /
    • 2018
  • The number of capabilities of Internet of Things (IoT) devices will exponentially grow over the next years. These devices may generate a vast amount of time-constrained data. In the context of IoT, data management should act as a layer between the objects and devices generating the data and the applications accessing the data for analysis purposes and services. In addition, most of IoT services will be content-centric rather than host centric to increase the data availability and the efficiency of data delivery. IoT will enable all the communication devices to be interconnected and make the data generated by or associated with devices or objects globally accessible. Also, fog computing keeps data and computation close to end users at the edge of network, and thus provides a new breed of applications and services to end users with low latency, high bandwidth, and geographically distributed. In this paper, we propose Edge-Fog cloud-based Hierarchical Data Delivery ($EFcHD^2$) method that effectively and reliably delivers IoT data to associated with IoT applications with ensuring time sensitivity. The proposed $EFcHD^2$ method stands on basis of fully decentralized hybrid of Edge and Fog compute cloud model, Edge-Fog cloud, and uses information-centric networking and bloom filters. In addition, it stores the replica of IoT data or the pre-processed feature data by edge node in the appropriate locations of Edge-Fog cloud considering the characteristic of IoT data: locality, size, time sensitivity and popularity. Then, the performance of $EFcHD^2$ method is evaluated through an analytical model, and is compared to fog server-based and Content-Centric Networking (CCN)-based data delivery methods.

A New Optimized Localized Technique of CG Return Stroke Lightning Channel in Forest

  • Kabir, Homayun;Kanesan, Jeevan;Reza, Ahmed Wasif;Ramiah, Harikrishnan;Dimyati, Kaharudin
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.6
    • /
    • pp.2356-2363
    • /
    • 2015
  • Localization of lightning strike point (LSP) in the forest is modeled to mitigate the forest fire damage. Though forest fire ignited by lightning rarely happens, its damage on the forest is grievousness. Therefore, predicting accurate location of LSP becomes crucial in order to control the forest fire. In this paper, we proposed a new hybrid localization algorithm by combining the received signal strength (RSS) and the received signal strength ratio (RSSR) to improve the accuracy by mitigating the environmental effect of lightning strike location in the forest. The proposed hybrid algorithm employs antenna theory (AT) model of cloud-to-ground (CG) return stroke lightning channel to forecast the location of the lightning strike. The obtained results show that the proposed hybrid algorithm achieves better location accuracy compared to the existing RSS method for predicting the lightning strike location considering additive white Gaussian noise (AWGN) environment.

Design and Implementation of Hybrid Apps Design based on Spring MVC (스프링 MVC 기반에서 하이브리드 앱 디자인 설계 및 구현)

  • Lee, Myeong-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.395-400
    • /
    • 2019
  • The Web environment of the frontend domain is increasingly competitive to preempt the new standard of presentation layer. N-Screen, a service that enables users to seamlessly use one content in various devices in Korea, is competing for market preemption by recognizing it as a core service of the future. In the cloud computing, N-screen is a typical service type. However, most of the frontend research required for groupware in enterprise environments has been limited to responsive web design for the web and native apps for mobile. Gradually, the need for MVC design patterns is increasingly widening in enterprise environments to overcome the cultural differences of companies and to support one source multi-use strategy supporting multiple devices and development productivity. Therefore, in this study, we will analyze and design JPetStore with hybrid application design based on Spring MVC, e-government standard framework environment of next generation web standard, and provide reference model of frontend hybrid apps design in future enterprise environment.

Accuracy Analysis for Slope Movement Characterization by comparing the Data from Real-time Measurement Device and 3D Model Value with Drone based Photogrammetry (도로비탈면 상시계측 실측치와 드론 사진측량에 의한 3D 모델값의 정확도 비교분석)

  • CHO, Han-Kwang;CHANG, Ki-Tae;HONG, Seong-Jin;HONG, Goo-Pyo;KIM, Sang-Hwan;KWON, Se-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.23 no.4
    • /
    • pp.234-252
    • /
    • 2020
  • This paper is to verify the effectiveness of 'Hybrid Disaster Management Strategy' that integrates 'RTM(Real-time Monitoring) based On-line' and 'UAV based Off-line' system. For landslide prone area where sensors were installed, the conventional way of risk management so far has entirely relied on RTM data collected from the field through the instrumentation devices. But it's not enough due to the limitation of'Pin-point sensor'which tend to provide with only the localized information where sensors have stayed fixed. It lacks, therefore, the whole picture to be grasped. In this paper, utilizing 'Digital Photogrammetry Software Pix4D', the possibility of inference for the deformation of ungauged area has been reviewed. For this purpose, actual measurement data from RTM were compared with the estimated value from 3D point cloud outcome by UAV, and the consequent results has shown very accurate in terms of RMSE.

Feature Recognition for Digitizing Path Generation in Reverse Engineering (역공학에서 측정경로생성을 위한 특징형상 인식)

  • Kim Seung Hyun;Kim Jae Hyun;Park Jung Whan;Ko Tae Jo
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.21 no.12
    • /
    • pp.100-108
    • /
    • 2004
  • In reverse engineering, data acquisition methodology can generally be categorized into contacting and non-contacting types. Recently, researches on hybrid or sensor fusion of the two types have been increasing. In addition, efficient construction of a geometric model from the measurement data is required, where considerable amount of user interaction to classify and localize regions of interest is inevitable. Our research focuses on the classification of each bounded region into a pre-defined feature shape fer a hybrid measuring scheme, where the overall procedures are described as fellows. Firstly, the physical model is digitized by a non-contacting laser scanner which rapidly provides cloud-of-points data. Secondly, the overall digitized data are approximated to a z-map model. Each bounding curve of a region of interest (featured area) can be 1.aced out based on our previous research. Then each confined area is systematically classified into one of the pre-defined feature types such as floor, wall, strip or volume, followed by a more accurate measuring step via a contacting probe. Assigned to each feature is a specific digitizing path topology which may reflect its own geometric character. The research can play an important role in minimizing user interaction at the stage of digitizing path planning.

A Novel Cryptosystem Based on Steganography and Automata Technique for Searchable Encryption

  • Truong, Nguyen Huy
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2258-2274
    • /
    • 2020
  • In this paper we first propose a new cryptosystem based on our data hiding scheme (2,9,8) introduced in 2019 with high security, where encrypting and hiding are done at once, the ciphertext does not depend on the input image size as existing hybrid techniques of cryptography and steganography. We then exploit our automata approach presented in 2019 to design two algorithms for exact and approximate pattern matching on secret data encrypted by our cryptosystem. Theoretical analyses remark that these algorithms both have O(n) time complexity in the worst case, where for the approximate algorithm, we assume that it uses ⌈(1-ε)m)⌉ processors, where ε, m and n are the error of our string similarity measure and lengths of the pattern and secret data, respectively. In searchable encryption, our cryptosystem is used by users and our pattern matching algorithms are performed by cloud providers.