The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in...The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in the Cloud.In this paper,we present an alternative approach which divides big data into sequenced parts and stores them among multiple Cloud storage service providers.Instead of protecting the big data itself,the proposed scheme protects the mapping of the various data elements to each provider using a trapdoor function.Analysis,comparison and simulation prove that the proposed scheme is efficient and secure for the big data of Cloud tenants.展开更多
In order to study the spatiotemporal characteristics of the dockless bike sharing system(BSS)around urban rail transit stations,new normalized calculation methods are proposed to explore the temporal and spatial usage...In order to study the spatiotemporal characteristics of the dockless bike sharing system(BSS)around urban rail transit stations,new normalized calculation methods are proposed to explore the temporal and spatial usage patterns of the dockless BSS around rail transit stations by using 5-weekday dockless bike sharing trip data in Nanjing,China.First,the rail transit station area(RTSA)is defined by extracting shared bike trips with trip ends falling into the area.Then,the temporal and spatial decomposition methods are developed and two criterions are calculated,namely,normalized dynamic variation of bikes(NDVB)and normalized spatial distribution of trips(NSDT).Furthermore,the temporal and spatial usage patterns are clustered and the corresponding geographical distributions of shared bikes are determined.The results show that four temporal usage patterns and two spatial patterns of dockless BSS are finally identified.Area type(urban center and suburb)has a great influence on temporal usage patterns.Spatial usage patterns are irregular and affected by limited directions,adjacent rail transit stations and street networks.The findings can help form a better understanding of dockless shared bike users behavior around rail transit stations,which will contribute to improving the service and efficiency of both rail transit and BSS.展开更多
Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on-...Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on- demand allocation of network resources are particularly important in Cloud computing. Ho- wever, nearly all-current available cloud com- puting platforms are either proprietary or their software infrastructure is invisible to the rese- arch community except for a few open-source platforms. For universities and research insti- tutes, more open and testable experimental plat- forms are needed in a lab-level with PCs. In this paper, a platform of infrastructure resou- rce sharing system (Platform as a Service (PaaS)) is developed in virtual Cloud comput- hug environment. Its architecture, core modules, main functions, design and operational envir- onment and applications are introduced in de- tail. It has good expandability and can impr- ove resource sharing and utilization and is app- lied to regular computer science teaching and research process.展开更多
Flatness pattern recognition is the key of the flatness control. The accuracy of the present flatness pattern recognition is limited and the shape defects cannot be reflected intuitively. In order to improve it, a nov...Flatness pattern recognition is the key of the flatness control. The accuracy of the present flatness pattern recognition is limited and the shape defects cannot be reflected intuitively. In order to improve it, a novel method via T-S cloud inference network optimized by genetic algorithm(GA) is proposed. T-S cloud inference network is constructed with T-S fuzzy neural network and the cloud model. So, the rapid of fuzzy logic and the uncertainty of cloud model for processing data are both taken into account. What's more, GA possesses good parallel design structure and global optimization characteristics. Compared with the simulation recognition results of traditional BP Algorithm, GA is more accurate and effective. Moreover, virtual reality technology is introduced into the field of shape control by Lab VIEW, MATLAB mixed programming. And virtual flatness pattern recognition interface is designed.Therefore, the data of engineering analysis and the actual model are combined with each other, and the shape defects could be seen more lively and intuitively.展开更多
With the rapid development of social,science and technology ,we are always looking for the advanced and rapid manufacturing method and the management pattern.thus a new enterprise cooperation pattern-Virtual Enterpris...With the rapid development of social,science and technology ,we are always looking for the advanced and rapid manufacturing method and the management pattern.thus a new enterprise cooperation pattern-Virtual Enterprise arises at the historic moment. The cooperation is a process which advantages the temporary enterprise resources each other. Therefore, the virtual enterprise must encounter the problem that how to realize the virtual enterprises’ information resources sharing and improve the efficiency of enterprise cooperation. This paper uses the cloud computing’s advantage to solve the problem of virtual enterprise information resources sharing. Then enterprise is able to share the information of different regions,different computing environment and improve the efficiency of virtual enterprise cooperation.展开更多
Nowadays most of the cloud applications process large amount of data to provide the desired results. The Internet environment, the enterprise network advertising, network marketing plan, need partner sites selected as...Nowadays most of the cloud applications process large amount of data to provide the desired results. The Internet environment, the enterprise network advertising, network marketing plan, need partner sites selected as carrier and publishers. Website through static pages, dynamic pages, floating window, AD links, take the initiative to push a variety of ways to show the user enterprise marketing solutions, when the user access to web pages, use eye effect and concentration effect, attract users through reading web pages or click the page again, let the user detailed comprehensive understanding of the marketing plan, which affects the user' s real purchase decisions. Therefore, we combine the cloud environment with search engine optimization technique, the result shows that our method outperforms compared with other approaches.展开更多
Data sharing is a main application of cloud computing. Some existing solutions are proposed to provide flexible access control for outsourced data in the cloud. However, few attentions have been paid to group-oriented...Data sharing is a main application of cloud computing. Some existing solutions are proposed to provide flexible access control for outsourced data in the cloud. However, few attentions have been paid to group-oriented data sharing when multiple data owners want to share their private data for cooperative purposes. In this paper, we put forward a new paradigm, referred to as secure, scalable and efficient multi-owner(SSEM) data sharing in clouds. The SSEM integrates identity-based encryption and asymmetric group key agreement to enable group-oriented access control for data owners in a many-to-many sharing pattern. Moreover, with SSEM, users can join in or leave from the group conveniently with the privacy of both group data and user data.We proposed the key-ciphertext homomorphism technique to construct an SSEM scheme with short ciphertexts. The security analysis shows that our SSEM scheme achieves data security against unauthorized accesses and collusion attacks. Both theoretical and experimental results confirm that our proposed scheme takes users little costs to share and access outsourced data in a group manner.展开更多
In this paper, we present an approach to establish efficient and scalable service provisioning in the cloud environment using P2P-based infrastructure for storing, sharing and discovering services. Unlike most other P...In this paper, we present an approach to establish efficient and scalable service provisioning in the cloud environment using P2P-based infrastructure for storing, sharing and discovering services. Unlike most other P2P-based approaches, it allows flexible search queries, since all of them are executed against internal database presenting at each overlay node. Various issues concerning using this approach in the cloud environment, such as load-balancing, queuing, dealing with skewed data and dynamic attributes, are addressed in the paper. The infrastructure proposed in the paper can serve as a base for creating robust, scalable and reliable cloud systems, able to fulfill client’s QoS requirements, and at the same time introduce more efficient utilization of resources to the cloud provider.展开更多
The Cloud Computing Environment(CCE)developed for using the dynamic cloud is the ability of software and services likely to grow with any business.It has transformed the methodology for storing the enterprise data,acc...The Cloud Computing Environment(CCE)developed for using the dynamic cloud is the ability of software and services likely to grow with any business.It has transformed the methodology for storing the enterprise data,accessing the data,and Data Sharing(DS).Big data frame a constant way of uploading and sharing the cloud data in a hierarchical architecture with different kinds of separate privileges to access the data.With the requirement of vast volumes of storage area in the CCEs,capturing a secured data access framework is an important issue.This paper proposes an Improved Secure Identification-based Multilevel Structure of Data Sharing(ISIMSDS)to hold the DS of big data in CCEs.The complex file partitioning technique is proposed to verify the access privilege context for sharing data in complex CCEs.An access control Encryption Method(EM)is used to improve the encryption.The Complexity is measured to increase the authentication standard.The active attack is protected using this ISIMSDS methodology.Our proposed ISIMSDS method assists in diminishing the Complexity whenever the user’s population is increasing rapidly.The security analysis proves that the proposed ISIMSDS methodology is more secure against the chosen-PlainText(PT)attack and provides more efficient computation and storage space than the related methods.The performance of the proposed ISIMSDS methodology provides more efficiency in communication costs such as encryption,decryption,and retrieval of the data.展开更多
Cloud computing is a new computing model. The application of cloud computing to the field of higher education informatization has been very popular currently. In this paper, the concept and characteristics of cloud co...Cloud computing is a new computing model. The application of cloud computing to the field of higher education informatization has been very popular currently. In this paper, the concept and characteristics of cloud computing are introduced, the current situation of the teaching resources sharing and construction in colleges and universities is analyzed, and finally the influence of cloud computing on the construction of teaching information resources is discussed.展开更多
The late Warring States Period (475 B.C-221 B.C)Caliber diameter:18.2 cm Bronze with inlaid silver The surfaces of the utensil body and the lid are decorated with cloud patterns by using the inlaid gold or silver fila...The late Warring States Period (475 B.C-221 B.C)Caliber diameter:18.2 cm Bronze with inlaid silver The surfaces of the utensil body and the lid are decorated with cloud patterns by using the inlaid gold or silver filaments and flakes. The decorative patterns are very slim and extremely exquisite.展开更多
This paper first reviews the current state of multimedia teaching resource sharing in China as well as the problems encountered. It then proceeds to the focus that a good way out for the dilemma is to design a platfor...This paper first reviews the current state of multimedia teaching resource sharing in China as well as the problems encountered. It then proceeds to the focus that a good way out for the dilemma is to design a platform of multimedia teaching resource sharing based on cloud service concept.展开更多
In recent decades,Arctic summer sea ice extent(SIE)has shown a rapid decline overlaid with large interannual variations,both of which are influenced by geopotential height anomalies over Greenland(GL-high)and the cent...In recent decades,Arctic summer sea ice extent(SIE)has shown a rapid decline overlaid with large interannual variations,both of which are influenced by geopotential height anomalies over Greenland(GL-high)and the central Arctic(CA-high).In this study,SIE along coastal Siberia(Sib-SIE)and Alaska(Ala-SIE)is found to account for about 65%and 21%of the Arctic SIE interannual variability,respectively.Variability in Ala-SIE is related to the GL-high,whereas variability in Sib-SIE is related to the CA-high.A decreased Ala-SIE is associated with decreased cloud cover and increased easterly winds along the Alaskan coast,promoting ice-albedo feedback.A decreased Sib-SIE is associated with a significant increase in water vapor and downward longwave radiation(DLR)along the Siberian coast.The years 2012 and 2020 with minimum recorded ASIE are used as examples.Compared to climatology,summer 2012 is characterized by a significantly enhanced GL-high with major sea ice loss along the Alaskan coast,while summer 2020 is characterized by an enhanced CA-high with sea ice loss focused along the Siberian coast.In 2012,the lack of cloud cover along the Alaskan coast contributed to an increase in incoming solar radiation,amplifying ice-albedo feedback there;while in 2020,the opposite occurs with an increase in cloud cover along the Alaskan coast,resulting in a slight increase in sea ice there.Along the Siberian coast,increased DLR in 2020 plays a dominant role in sea ice loss,and increased cloud cover and water vapor both contribute to the increased DLR.展开更多
With the development of world heritage protection undertakings, dynamic inheritance of intangible cultural heritage has become a topic of great concern. This study explored the feasibility of integrating cloud-pattern...With the development of world heritage protection undertakings, dynamic inheritance of intangible cultural heritage has become a topic of great concern. This study explored the feasibility of integrating cloud-pattern brocade heritage and modern design and the innovation techniques, so as to provide new concepts for the inheritance and development of intangible cultural heritage.展开更多
基金supported in part by the National Nature Science Foundation of China under Grant No.61402413 and 61340058 the "Six Kinds Peak Talents Plan" project of Jiangsu Province under Grant No.ll-JY-009+2 种基金the Nature Science Foundation of Zhejiang Province under Grant No.LY14F020019, Z14F020006 and Y1101183the China Postdoctoral Science Foundation funded project under Grant No.2012M511732Jiangsu Province Postdoctoral Science Foundation funded project Grant No.1102014C
文摘The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in the Cloud.In this paper,we present an alternative approach which divides big data into sequenced parts and stores them among multiple Cloud storage service providers.Instead of protecting the big data itself,the proposed scheme protects the mapping of the various data elements to each provider using a trapdoor function.Analysis,comparison and simulation prove that the proposed scheme is efficient and secure for the big data of Cloud tenants.
基金The National Key R&D Program of China(No.2018YFB1600900)the Project of International Cooperation and Exchange of the National Natural Science Foundation of China(No.51561135003)the Key Project of National Natural Science Foundation of China(No.51338003)
文摘In order to study the spatiotemporal characteristics of the dockless bike sharing system(BSS)around urban rail transit stations,new normalized calculation methods are proposed to explore the temporal and spatial usage patterns of the dockless BSS around rail transit stations by using 5-weekday dockless bike sharing trip data in Nanjing,China.First,the rail transit station area(RTSA)is defined by extracting shared bike trips with trip ends falling into the area.Then,the temporal and spatial decomposition methods are developed and two criterions are calculated,namely,normalized dynamic variation of bikes(NDVB)and normalized spatial distribution of trips(NSDT).Furthermore,the temporal and spatial usage patterns are clustered and the corresponding geographical distributions of shared bikes are determined.The results show that four temporal usage patterns and two spatial patterns of dockless BSS are finally identified.Area type(urban center and suburb)has a great influence on temporal usage patterns.Spatial usage patterns are irregular and affected by limited directions,adjacent rail transit stations and street networks.The findings can help form a better understanding of dockless shared bike users behavior around rail transit stations,which will contribute to improving the service and efficiency of both rail transit and BSS.
基金supported by the Coalition for National Science Fundingunder Grant No.61150110486the Central University Funding under Grant No.ZYGX2013J073
文摘Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on- demand allocation of network resources are particularly important in Cloud computing. Ho- wever, nearly all-current available cloud com- puting platforms are either proprietary or their software infrastructure is invisible to the rese- arch community except for a few open-source platforms. For universities and research insti- tutes, more open and testable experimental plat- forms are needed in a lab-level with PCs. In this paper, a platform of infrastructure resou- rce sharing system (Platform as a Service (PaaS)) is developed in virtual Cloud comput- hug environment. Its architecture, core modules, main functions, design and operational envir- onment and applications are introduced in de- tail. It has good expandability and can impr- ove resource sharing and utilization and is app- lied to regular computer science teaching and research process.
基金Project(LJRC013)supported by the University Innovation Team of Hebei Province Leading Talent Cultivation,China
文摘Flatness pattern recognition is the key of the flatness control. The accuracy of the present flatness pattern recognition is limited and the shape defects cannot be reflected intuitively. In order to improve it, a novel method via T-S cloud inference network optimized by genetic algorithm(GA) is proposed. T-S cloud inference network is constructed with T-S fuzzy neural network and the cloud model. So, the rapid of fuzzy logic and the uncertainty of cloud model for processing data are both taken into account. What's more, GA possesses good parallel design structure and global optimization characteristics. Compared with the simulation recognition results of traditional BP Algorithm, GA is more accurate and effective. Moreover, virtual reality technology is introduced into the field of shape control by Lab VIEW, MATLAB mixed programming. And virtual flatness pattern recognition interface is designed.Therefore, the data of engineering analysis and the actual model are combined with each other, and the shape defects could be seen more lively and intuitively.
文摘With the rapid development of social,science and technology ,we are always looking for the advanced and rapid manufacturing method and the management pattern.thus a new enterprise cooperation pattern-Virtual Enterprise arises at the historic moment. The cooperation is a process which advantages the temporary enterprise resources each other. Therefore, the virtual enterprise must encounter the problem that how to realize the virtual enterprises’ information resources sharing and improve the efficiency of enterprise cooperation. This paper uses the cloud computing’s advantage to solve the problem of virtual enterprise information resources sharing. Then enterprise is able to share the information of different regions,different computing environment and improve the efficiency of virtual enterprise cooperation.
文摘Nowadays most of the cloud applications process large amount of data to provide the desired results. The Internet environment, the enterprise network advertising, network marketing plan, need partner sites selected as carrier and publishers. Website through static pages, dynamic pages, floating window, AD links, take the initiative to push a variety of ways to show the user enterprise marketing solutions, when the user access to web pages, use eye effect and concentration effect, attract users through reading web pages or click the page again, let the user detailed comprehensive understanding of the marketing plan, which affects the user' s real purchase decisions. Therefore, we combine the cloud environment with search engine optimization technique, the result shows that our method outperforms compared with other approaches.
基金supported in part by National High-Tech Research and Development Program of China(“863”Program)under Grant No.2015AA016004National Natural Science Foundation of China under Grants No.61173154,61272451,61572380
文摘Data sharing is a main application of cloud computing. Some existing solutions are proposed to provide flexible access control for outsourced data in the cloud. However, few attentions have been paid to group-oriented data sharing when multiple data owners want to share their private data for cooperative purposes. In this paper, we put forward a new paradigm, referred to as secure, scalable and efficient multi-owner(SSEM) data sharing in clouds. The SSEM integrates identity-based encryption and asymmetric group key agreement to enable group-oriented access control for data owners in a many-to-many sharing pattern. Moreover, with SSEM, users can join in or leave from the group conveniently with the privacy of both group data and user data.We proposed the key-ciphertext homomorphism technique to construct an SSEM scheme with short ciphertexts. The security analysis shows that our SSEM scheme achieves data security against unauthorized accesses and collusion attacks. Both theoretical and experimental results confirm that our proposed scheme takes users little costs to share and access outsourced data in a group manner.
文摘In this paper, we present an approach to establish efficient and scalable service provisioning in the cloud environment using P2P-based infrastructure for storing, sharing and discovering services. Unlike most other P2P-based approaches, it allows flexible search queries, since all of them are executed against internal database presenting at each overlay node. Various issues concerning using this approach in the cloud environment, such as load-balancing, queuing, dealing with skewed data and dynamic attributes, are addressed in the paper. The infrastructure proposed in the paper can serve as a base for creating robust, scalable and reliable cloud systems, able to fulfill client’s QoS requirements, and at the same time introduce more efficient utilization of resources to the cloud provider.
文摘The Cloud Computing Environment(CCE)developed for using the dynamic cloud is the ability of software and services likely to grow with any business.It has transformed the methodology for storing the enterprise data,accessing the data,and Data Sharing(DS).Big data frame a constant way of uploading and sharing the cloud data in a hierarchical architecture with different kinds of separate privileges to access the data.With the requirement of vast volumes of storage area in the CCEs,capturing a secured data access framework is an important issue.This paper proposes an Improved Secure Identification-based Multilevel Structure of Data Sharing(ISIMSDS)to hold the DS of big data in CCEs.The complex file partitioning technique is proposed to verify the access privilege context for sharing data in complex CCEs.An access control Encryption Method(EM)is used to improve the encryption.The Complexity is measured to increase the authentication standard.The active attack is protected using this ISIMSDS methodology.Our proposed ISIMSDS method assists in diminishing the Complexity whenever the user’s population is increasing rapidly.The security analysis proves that the proposed ISIMSDS methodology is more secure against the chosen-PlainText(PT)attack and provides more efficient computation and storage space than the related methods.The performance of the proposed ISIMSDS methodology provides more efficiency in communication costs such as encryption,decryption,and retrieval of the data.
文摘Cloud computing is a new computing model. The application of cloud computing to the field of higher education informatization has been very popular currently. In this paper, the concept and characteristics of cloud computing are introduced, the current situation of the teaching resources sharing and construction in colleges and universities is analyzed, and finally the influence of cloud computing on the construction of teaching information resources is discussed.
文摘The late Warring States Period (475 B.C-221 B.C)Caliber diameter:18.2 cm Bronze with inlaid silver The surfaces of the utensil body and the lid are decorated with cloud patterns by using the inlaid gold or silver filaments and flakes. The decorative patterns are very slim and extremely exquisite.
文摘This paper first reviews the current state of multimedia teaching resource sharing in China as well as the problems encountered. It then proceeds to the focus that a good way out for the dilemma is to design a platform of multimedia teaching resource sharing based on cloud service concept.
基金the National Key Research and Development Program of China(Grant Nos.2021YFC2802504 and 2019YFC1509104)the Innovation Group Project of Southern Marine Science and Engineering Guangdong Laboratory(Zhuhai)(Grant No.311021008).
文摘In recent decades,Arctic summer sea ice extent(SIE)has shown a rapid decline overlaid with large interannual variations,both of which are influenced by geopotential height anomalies over Greenland(GL-high)and the central Arctic(CA-high).In this study,SIE along coastal Siberia(Sib-SIE)and Alaska(Ala-SIE)is found to account for about 65%and 21%of the Arctic SIE interannual variability,respectively.Variability in Ala-SIE is related to the GL-high,whereas variability in Sib-SIE is related to the CA-high.A decreased Ala-SIE is associated with decreased cloud cover and increased easterly winds along the Alaskan coast,promoting ice-albedo feedback.A decreased Sib-SIE is associated with a significant increase in water vapor and downward longwave radiation(DLR)along the Siberian coast.The years 2012 and 2020 with minimum recorded ASIE are used as examples.Compared to climatology,summer 2012 is characterized by a significantly enhanced GL-high with major sea ice loss along the Alaskan coast,while summer 2020 is characterized by an enhanced CA-high with sea ice loss focused along the Siberian coast.In 2012,the lack of cloud cover along the Alaskan coast contributed to an increase in incoming solar radiation,amplifying ice-albedo feedback there;while in 2020,the opposite occurs with an increase in cloud cover along the Alaskan coast,resulting in a slight increase in sea ice there.Along the Siberian coast,increased DLR in 2020 plays a dominant role in sea ice loss,and increased cloud cover and water vapor both contribute to the increased DLR.
基金Sponsored by Education Science Youth Program of National Social Sciences Fund(CLA100169)
文摘With the development of world heritage protection undertakings, dynamic inheritance of intangible cultural heritage has become a topic of great concern. This study explored the feasibility of integrating cloud-pattern brocade heritage and modern design and the innovation techniques, so as to provide new concepts for the inheritance and development of intangible cultural heritage.