您现在的位置: 首页> 研究主题> cloud

cloud

cloud的相关文献在1989年到2023年内共计292篇,主要集中在自动化技术、计算机技术、肿瘤学、大气科学(气象学) 等领域,其中期刊论文251篇、专利文献41篇;相关期刊110种,包括语言教育、热带气象学报:英文版、大气科学进展:英文版等; cloud的相关文献由777位作者贡献,包括Arshdeep Bahga、刘兴龙、祁国良等。

cloud—发文量

期刊论文>

论文:251 占比:85.96%

专利文献>

论文:41 占比:14.04%

总计:292篇

cloud—发文趋势图

cloud

-研究学者

  • Arshdeep Bahga
  • 刘兴龙
  • 祁国良
  • 黄智勇
  • Abdul Rasheed Mahesar
  • Abdullah Lakhan
  • Alain Abran
  • Amir Mohamed Talib
  • C·伯恩
  • Debajyoti Mukhopadhyay
  • 期刊论文
  • 专利文献

搜索

排序:

年份

期刊

关键词

    • Passent El-kafrawy; Maie Aboghazalah; Abdelmoty M.Ahmed; Hanaa Torkey; Ayman El-Sayed
    • 摘要: Healthcare systems nowadays depend on IoT sensors for sending data over the internet as a common practice.Encryption ofmedical images is very important to secure patient information.Encrypting these images consumes a lot of time onedge computing;therefore,theuse of anauto-encoder for compressionbefore encodingwill solve such a problem.In this paper,we use an auto-encoder to compress amedical image before encryption,and an encryption output(vector)is sent out over the network.On the other hand,a decoder was used to reproduce the original image back after the vector was received and decrypted.Two convolutional neural networks were conducted to evaluate our proposed approach:The first one is the auto-encoder,which is utilized to compress and encrypt the images,and the other assesses the classification accuracy of the image after decryption and decoding.Different hyperparameters of the encoder were tested,followed by the classification of the image to verify that no critical information was lost,to test the encryption and encoding resolution.In this approach,sixteen hyperparameter permutations are utilized,but this research discusses three main cases in detail.The first case shows that the combination of Mean Square Logarithmic Error(MSLE),ADAgrad,two layers for the auto-encoder,and ReLU had the best auto-encoder results with a Mean Absolute Error(MAE)=0.221 after 50 epochs and 75%classification with the best result for the classification algorithm.The second case shows the reflection of auto-encoder results on the classification results which is a combination ofMean Square Error(MSE),RMSprop,three layers for the auto-encoder,and ReLU,which had the best classification accuracy of 65%,the auto-encoder gives MAE=0.31 after 50 epochs.The third case is the worst,which is the combination of the hinge,RMSprop,three layers for the auto-encoder,and ReLU,providing accuracy of 20%and MAE=0.485.
    • Cuixiang Zhong
    • 摘要: Global warming and its serious consequences have attracted more and more attention,and how to deal with global warming has aroused extensive debate and research.Although many people believe that global warming is caused by human burning fossil fuels,there is still controversy in the scientific community.Therefore,the author analyzes various factors affecting global climate change,finds that the retreat of polar glaciers is the main cause of global warming,and puts forward reasonable countermeasures to prevent global warming.
    • B.Albertazzi; P.Mabey; Th.Michel; G.Rigon; J.R.Marques; S.Pikuz; S.Ryazantsev; E.Falize; L.Van Box Som; J.Meinecke; N.Ozaki; G.Gregori; M.Koenig
    • 摘要: The interaction between a molecular cloud and an external agent(e.g.,a supernova remnant,plasma jet,radiation,or another cloud)is a common phenomenon throughout the Universe and can significantly change the star formation rate within a galaxy.This process leads to fragmentation of the cloud and to its subsequent compression and can,eventually,initiate the gravitational collapse of a stable molecular cloud.It is,however,difficult to study such systems in detail using conventional techniques(numerical simulations and astronomical observations),since complex interactions of flows occur.In this paper,we experimentally investigate the compression of a foam ball by Taylor–Sedov blast waves,as an analog of supernova remnants interacting with a molecular cloud.The formation of a compression wave is observed in the foam ball,indicating the importance of such experiments for understanding how star formation is triggered by external agents.
    • Jinsu Kim; Sungwook Ryu; Namje Park
    • 摘要: A significant number of cloud storage environments are already implementing deduplication technology.Due to the nature of the cloud environment,a storage server capable of accommodating large-capacity storage is required.As storage capacity increases,additional storage solutions are required.By leveraging deduplication,you can fundamentally solve the cost problem.However,deduplication poses privacy concerns due to the structure itself.In this paper,we point out the privacy infringement problemand propose a new deduplication technique to solve it.In the proposed technique,since the user’s map structure and files are not stored on the server,the file uploader list cannot be obtained through the server’s meta-information analysis,so the user’s privacy is maintained.In addition,the personal identification number(PIN)can be used to solve the file ownership problemand provides advantages such as safety against insider breaches and sniffing attacks.The proposed mechanism required an additional time of approximately 100 ms to add a IDRef to distinguish user-file during typical deduplication,and for smaller file sizes,the time required for additional operations is similar to the operation time,but relatively less time as the file’s capacity grows.
    • 摘要: With the emergence of Internet of Things, modern control systems have to deal with the big data from the ubiquitous information sensing devices, which is often beyond the capacity of traditional control technologies. To deal with this issue, the rapidly developing cloud computing may provide a perfect platform for big data storage and processing, controller design, and performance optimization.
    • Ajay Kumar; K.Abhishek; M.R.Ghalib; A.Shankar; X.Cheng
    • 摘要: Internet of Things(IoT)security is the act of securing IoT devices and networks.IoT devices,including industrial machines,smart energy grids,and building automation,are extremely vulnerable.With the goal of shielding network systems from illegal access in cloud servers and IoT systems,Intrusion Detection Systems(IDSs)and Network-based Intrusion Prevention Systems(NBIPSs)are proposed in this study.An intrusion prevention system is proposed to realize NBIPS to safeguard top to bottom engineering.The proposed NBIPS inspects network activity streams to identify and counteract misuse instances.The NBIPS is usually located specifically behind a firewall,and it provides a reciprocal layer of investigation that adversely chooses unsafe substances.Networkbased IPS sensors can be installed either in an inline or a passive model.An inline sensor is installed to monitor the traffic passing through it.The sensors are installed to stop attacks by blocking the traffic using an IoT signature-based protocol.
    • Zhanyang Xu; Dawei Zhu; Jinhui Chen; Baohua Yu
    • 摘要: Aiming to meet the growing demand for observation and analysis in power systems that based on Internet of Things(IoT),machine learning technology has been adopted to deal with the data-intensive power electronics applications in IoT.By feeding previous power electronic data into the learning model,accurate information is drawn,and the quality of IoT-based power services is improved.Generally,the data-intensive electronic applications with machine learning are split into numerous data/control constrained tasks by workflow technology.The efficient execution of this data-intensive Power Workflow(PW)needs massive computing resources,which are available in the cloud infrastructure.Nevertheless,the execution efficiency of PW decreases due to inappropriate sub-task and data placement.In addition,the power consumption explodes due to massive data acquisition.To address these challenges,a PW placement method named PWP is devised.Specifically,the Non-dominated Sorting Differential Evolution(NSDE)is used to generate placement strategies.The simulation experiments show that PWP achieves the best trade-off among data acquisition time,power consumption,load distribution and privacy preservation,confirming that PWP is effective for the placement problem.
    • PAN Yi; CUI Laizhong; CAI Zhipeng; LI Wei
    • 摘要: Recent years have witnessed the proliferation of Internet of Things(IoT),in which billions of devices are connected to the Internet,generating an overwhelming amount of data.It is challenging and infeasible to transfer and process trillions and zillions of bytes using the current cloud-device architecture.
    • Priyadarsini Karthik; Karthik Sekhar
    • 摘要: Many organizations around the world use cloud computing Testing as Service(Taas)for their services.Cloud computing is principally based on the idea of on-demand delivery of computation,storage,applications,and additional resources.It depends on delivering user services through Internet connectivity.In addition,it uses a pay-as-you-go business design to deliver user services.It offers some essential characteristics including on-demand service,resource pooling,rapid elasticity,virtualization,and measured services.There are various types of virtualization,such as full virtualization,para-virtualization,emulation,〇S virtualization,and application virtualization.Resource scheduling in Taas is among the most challenging jobs in resource allocation to mandatory tasks/jobs based on the required quality of applications and projects.Because of the cloud environment,uncertainty,and perhaps heterogeneity,resource allocation cannot be addressed with prevailing policies.This situation remains a significant concern for the majority of cloud providers,as they face challenges in selecting the correct resource scheduling algorithm for a particular workload.The authors use the emergent artificial intelligence algorithms deep RM2,deep reinforcement learning,and deep reinforcement learning for Taas cloud scheduling to resolve the issue of resource scheduling in cloud Taas.
    • Mohamed Eb-Saad; Yunyoung Nam; Hazem M.El-bakry; Samir Abdelrazek
    • 摘要: Web service(WS)presents a good solution to the interoperability of different types of systems that aims to reduce the overhead of high processing in a resource-limited environment.With the increasing demand for mobile WS(MWS),the WS discovery process has become a significant challenging point in the WS lifecycle that aims to identify the relevant MWSs that best match the service requests.This discovery process is a resource-consuming task that cannot be performed efficiently in a mobile computing environment due to the limitations of mobile devices.Meanwhile,a cloud computing can provide rich computing resources for mobile environments given its unlimited and easily scalable resources.This paper proposes a semantic WS discovery and invocation framework in mobile environments based on cloud and a relationship-aware matchmaking algorithm.The discovery algorithm enriches MWS and user requests semantically with the functional and non-functional properties of Ontology Web Language for Services,such as Quality of Web Service,device context,and user preferences.The WS repository is filtered based on logical reasoning and a parameter-based matching algorithm to minimize the matching space and improve runtime performance.The cosine similarity between the user request and services repository is then assessed to generate the most relevant WS.The relationships among concepts in the ontology are considered to improve the recall and precision ratio.After the WS discovery process,users can invoke and test these services in a mobile environment through a dynamic user interface.The interface of the invocation process is changed according to the WS description document.An application prototype is also developed to evaluate the framework based on a Cordova cross-mobile development framework.
  • 查看更多

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号