More and more out of core problems that involve solving large amounts of data are researched by scientists. The computational grid provides a wide and scalable environment for those large scale computations. A new met...More and more out of core problems that involve solving large amounts of data are researched by scientists. The computational grid provides a wide and scalable environment for those large scale computations. A new method supporting out of core computations on grids is presented in this paper. The framework and the data storage strategy are described, based on which an easy and efficient out of core programming interface is provided for the programmers.展开更多
The information centric network(ICN)has been widely discussed in current researches.The ICN interoperation with a traditional IP network and caching methods are one of the research topics of interest.For economic reas...The information centric network(ICN)has been widely discussed in current researches.The ICN interoperation with a traditional IP network and caching methods are one of the research topics of interest.For economic reasons,the capability of applying the ICN to internet service providers(ISPs)with various traditional IP protocols already implemented,especially IGP,MPLS,VRF,and TE,does not require any change on the IP network infrastructure.The biggest concern of ISPs is related to their customers’contents delivery speed.In this paper,we consider ICN caching locations in ISP by using the concept of locator/ID separation protocol(LISP)for interoperation between a traditional IP address and name-based ICN.To be more specific,we propose a new procedure to determine caching locations in the ICN by using the cuckoo search algorithm(CSA)for finding the best caching locations of information chunks.Moreover,we create the smart control plane(SCP)scheme which is an intelligent controlling,managing,and mapping system.Its function is similar to the software defined network concept.We show how the proposed SCP system works in both synthetic small network and real-world big network.Finally,we show and evaluate the performance of our algorithm comparison with the simple search method using the shortest path first algorithm.展开更多
This paper presents a scenario of forest fire suppression using UAVs (Unmanned Aerial Vehicles) and addresses task assignment algorithm to coordinate UAVs. Forest fires are a major problem in many nations and fast e...This paper presents a scenario of forest fire suppression using UAVs (Unmanned Aerial Vehicles) and addresses task assignment algorithm to coordinate UAVs. Forest fires are a major problem in many nations and fast extinguishing forest fires brings a lot of ecological advantages so proper use of firefighting resources is very critical. In this sense, multi UAVs forest fire suppression system can be effective way to prevent fire outbreaks. In multi agent system, an appropriate task assignment according to the SA (Situational Awareness) is the most essential to conduct mission. We should consider real time re-planning or re-scheduling of multi UAVs team because environmental situations such as wind are changeable and that changes affect the forest fire spreading. Furthermore, we have to think about convergence to a consistent SA because it may take too much time. CBBA (Consensus-Based Bundle Algorithm) is robust decentralized task assignment tool so it can be implemented in real time re-planning application. A simulation model which is the main topic in this paper shows that multi UAVs can be properly operated to suppress forest fires even if there are unpredictable random factors and partial disconnection. The simulation model includes concrete operating scenarios and recursive task re-assign algorithm until fires in the whole area are suppressed.展开更多
In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme...In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme based on the hyperelliptic curve crypto system, which is applicable to the distributed cloud storage. A series of operation processes of the key management are elaborated, including key distribution, key updating and key agreement, etc. Analysis shows that the scheme can solve the problem of large-scale key management and storage issues in cloud storage effectively. The scheme feathers high efficiency and good scalability. It is able to resist collusion attack and ensure safe and reliable service provided by the cloud storaee system展开更多
文摘More and more out of core problems that involve solving large amounts of data are researched by scientists. The computational grid provides a wide and scalable environment for those large scale computations. A new method supporting out of core computations on grids is presented in this paper. The framework and the data storage strategy are described, based on which an easy and efficient out of core programming interface is provided for the programmers.
文摘The information centric network(ICN)has been widely discussed in current researches.The ICN interoperation with a traditional IP network and caching methods are one of the research topics of interest.For economic reasons,the capability of applying the ICN to internet service providers(ISPs)with various traditional IP protocols already implemented,especially IGP,MPLS,VRF,and TE,does not require any change on the IP network infrastructure.The biggest concern of ISPs is related to their customers’contents delivery speed.In this paper,we consider ICN caching locations in ISP by using the concept of locator/ID separation protocol(LISP)for interoperation between a traditional IP address and name-based ICN.To be more specific,we propose a new procedure to determine caching locations in the ICN by using the cuckoo search algorithm(CSA)for finding the best caching locations of information chunks.Moreover,we create the smart control plane(SCP)scheme which is an intelligent controlling,managing,and mapping system.Its function is similar to the software defined network concept.We show how the proposed SCP system works in both synthetic small network and real-world big network.Finally,we show and evaluate the performance of our algorithm comparison with the simple search method using the shortest path first algorithm.
文摘This paper presents a scenario of forest fire suppression using UAVs (Unmanned Aerial Vehicles) and addresses task assignment algorithm to coordinate UAVs. Forest fires are a major problem in many nations and fast extinguishing forest fires brings a lot of ecological advantages so proper use of firefighting resources is very critical. In this sense, multi UAVs forest fire suppression system can be effective way to prevent fire outbreaks. In multi agent system, an appropriate task assignment according to the SA (Situational Awareness) is the most essential to conduct mission. We should consider real time re-planning or re-scheduling of multi UAVs team because environmental situations such as wind are changeable and that changes affect the forest fire spreading. Furthermore, we have to think about convergence to a consistent SA because it may take too much time. CBBA (Consensus-Based Bundle Algorithm) is robust decentralized task assignment tool so it can be implemented in real time re-planning application. A simulation model which is the main topic in this paper shows that multi UAVs can be properly operated to suppress forest fires even if there are unpredictable random factors and partial disconnection. The simulation model includes concrete operating scenarios and recursive task re-assign algorithm until fires in the whole area are suppressed.
基金This work was supported in part by the National Science Foundation Project of P.R.China,the Fundamental Research Funds for the Central Universities under Grant No.FRF-TP-14-046A2
文摘In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme based on the hyperelliptic curve crypto system, which is applicable to the distributed cloud storage. A series of operation processes of the key management are elaborated, including key distribution, key updating and key agreement, etc. Analysis shows that the scheme can solve the problem of large-scale key management and storage issues in cloud storage effectively. The scheme feathers high efficiency and good scalability. It is able to resist collusion attack and ensure safe and reliable service provided by the cloud storaee system