期刊文献+
共找到1,569篇文章
< 1 2 79 >
每页显示 20 50 100
Hybrid Hierarchical Particle Swarm Optimization with Evolutionary Artificial Bee Colony Algorithm for Task Scheduling in Cloud Computing
1
作者 Shasha Zhao Huanwen Yan +3 位作者 Qifeng Lin Xiangnan Feng He Chen Dengyin Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第1期1135-1156,共22页
Task scheduling plays a key role in effectively managing and allocating computing resources to meet various computing tasks in a cloud computing environment.Short execution time and low load imbalance may be the chall... Task scheduling plays a key role in effectively managing and allocating computing resources to meet various computing tasks in a cloud computing environment.Short execution time and low load imbalance may be the challenges for some algorithms in resource scheduling scenarios.In this work,the Hierarchical Particle Swarm Optimization-Evolutionary Artificial Bee Colony Algorithm(HPSO-EABC)has been proposed,which hybrids our presented Evolutionary Artificial Bee Colony(EABC),and Hierarchical Particle Swarm Optimization(HPSO)algorithm.The HPSO-EABC algorithm incorporates both the advantages of the HPSO and the EABC algorithm.Comprehensive testing including evaluations of algorithm convergence speed,resource execution time,load balancing,and operational costs has been done.The results indicate that the EABC algorithm exhibits greater parallelism compared to the Artificial Bee Colony algorithm.Compared with the Particle Swarm Optimization algorithm,the HPSO algorithmnot only improves the global search capability but also effectively mitigates getting stuck in local optima.As a result,the hybrid HPSO-EABC algorithm demonstrates significant improvements in terms of stability and convergence speed.Moreover,it exhibits enhanced resource scheduling performance in both homogeneous and heterogeneous environments,effectively reducing execution time and cost,which also is verified by the ablation experimental. 展开更多
关键词 cloud computing distributed processing evolutionary artificial bee colony algorithm hierarchical particle swarm optimization load balancing
下载PDF
DDoS Attack Detection in Cloud Computing Based on Ensemble Feature Selection and Deep Learning
2
作者 Yousef Sanjalawe Turke Althobaiti 《Computers, Materials & Continua》 SCIE EI 2023年第5期3571-3588,共18页
Intrusion Detection System(IDS)in the cloud Computing(CC)environment has received paramount interest over the last few years.Among the latest approaches,Deep Learning(DL)-based IDS methods allow the discovery of attac... Intrusion Detection System(IDS)in the cloud Computing(CC)environment has received paramount interest over the last few years.Among the latest approaches,Deep Learning(DL)-based IDS methods allow the discovery of attacks with the highest performance.In the CC environment,Distributed Denial of Service(DDoS)attacks are widespread.The cloud services will be rendered unavailable to legitimate end-users as a consequence of the overwhelming network traffic,resulting in financial losses.Although various researchers have proposed many detection techniques,there are possible obstacles in terms of detection performance due to the use of insignificant traffic features.Therefore,in this paper,a hybrid deep learning mode based on hybridizing Convolutional Neural Network(CNN)with Long-Short-Term Memory(LSTM)is used due to its robustness and efficiency in detecting normal and attack traffic.Besides,the ensemble feature selection,mutualization aggregation between Particle Swarm Optimizer(PSO),Grey Wolf Optimizer(PSO),Krill Hird(KH),andWhale Optimization Algorithm(WOA),is used to select the most important features that would influence the detection performance in detecting DDoS attack in CC.A benchmark dataset proposed by the Canadian Institute of Cybersecurity(CIC),called CICIDS 2017 is used to evaluate the proposed IDS.The results revealed that the proposed IDS outperforms the state-of-the-art IDSs,as it achieved 97.9%,98.3%,97.9%,98.1%,respectively.As a result,the proposed IDS achieves the requirements of getting high security,automatic,efficient,and self-decision detection of DDoS attacks. 展开更多
关键词 CIC IDS 2017 cloud computing distributed denial of service ensemble feature selection intrusion detection system
下载PDF
A Cloud Computing Perspective for Distributed Routing in Vehicular Environments
3
作者 Smitha Shivshankar Abbas Jamalipour 《ZTE Communications》 2016年第3期36-44,共9页
Vehicular networks have been envisioned to provide us with numerous interesting services such as dissemination of real-time safety warnings and commercial advertisements via car-to-car communication. However, efficien... Vehicular networks have been envisioned to provide us with numerous interesting services such as dissemination of real-time safety warnings and commercial advertisements via car-to-car communication. However, efficient routing is a research challenge due to the highly dynamic nature of these networks. Nevertheless, the availability of connections imposes additional constraint. Our earlier works in the area of efficient dissemination integrates the advantages of middleware operations with muhicast routing to de- sign a framework for distributed routing in vehicular networks. Cloud computing makes use of pools of physical computing resourc- es to meet the requirements of such highly dynamic networks. The proposed solution in this paper applies the principles of cloud computing to our existing framework. The routing protocol works at the network layer for the formation of clouds in specific geo- graphic regions. Simulation results present the effieiency of the model in terms of serviee discovery, download time and the queu- ing delay at the controller nodes. 展开更多
关键词 cloud computing distributed routing vehicular networks
下载PDF
The Benefits of Using Google Cloud Computing for Developing Distributed Applications
4
作者 Isak Shabani Amir Kovaci Agni Dika 《Journal of Mathematics and System Science》 2015年第4期156-164,共9页
IT as a dynamic filed changes very rapidly; efficient management of such systems for the most of the companies requires handling tremendous complex situations in terms of hardware and software setup. Hardware and soft... IT as a dynamic filed changes very rapidly; efficient management of such systems for the most of the companies requires handling tremendous complex situations in terms of hardware and software setup. Hardware and software itself changes quickly with the time and keeping them updated is a difficult problem for the most of the companies; the problem is more emphasized for the companies having large infrastructure of IT facilities such as data centers which are expensive to be maintained. Many applications run on the company premises which require well prepared staff for successfully maintaining them. With the inception of Cloud Computing many companies have transferred their applications and data into cloud computing based platforms in order to have reduced maintaining cost, easier maintenance in terms of hardware and software, reliable and securely accessible services. The benefits of building distributed applications using Google infrastructure are conferred in this paper. 展开更多
关键词 Datastore BIGTABLE distributed application cloud computing
下载PDF
Video-based Person Re-identification Based on Distributed Cloud Computing
5
作者 Chengyan Zhong Xiaoyu Jiang Guanqiu Qi 《Journal of Artificial Intelligence and Technology》 2021年第2期110-120,共11页
Person re-identification has been a hot research issues in the field of computer vision.In recent years,with the maturity of the theory,a large number of excellent methods have been proposed.However,large-scale data s... Person re-identification has been a hot research issues in the field of computer vision.In recent years,with the maturity of the theory,a large number of excellent methods have been proposed.However,large-scale data sets and huge networks make training a time-consuming process.At the same time,the parameters and their values generated during the training process also take up a lot of computer resources.Therefore,we apply distributed cloud computing method to perform person re-identification task.Using distributed data storage method,pedestrian data sets and parameters are stored in cloud nodes.To speed up operational efficiency and increase fault tolerance,we add data redundancy mechanism to copy and store data blocks to different nodes,and we propose a hash loop optimization algorithm to optimize the data distribution process.Moreover,we assign different layers of the re-identification network to different nodes to complete the training in the way of model parallelism.By comparing and analyzing the accuracy and operation speed of the distributed model on the video-based dataset MARS,the results show that our distributed model has a faster training speed. 展开更多
关键词 person re-identification distributed cloud computing data redundancy mechanism
下载PDF
Study of Smart Grid Marketing System Architecture Based on Hadoop Platform of Cloud Computing
6
作者 Yu Song Maomao Wu Li Yang 《通讯和计算机(中英文版)》 2012年第7期741-743,共3页
关键词 营销系统 架构 平台 电网 智能 计算 电力营销 共享存储
下载PDF
Toward Cloud Computing QoS Architecture:Analysis of Cloud Systems and Cloud Services 被引量:20
7
作者 Mohammad Hossein Ghahramani MengChu Zhou Chi Tin Hon 《IEEE/CAA Journal of Automatica Sinica》 EI CSCD 2017年第1期6-18,共13页
Cloud can be defined as a new computing paradigm that provides scalable, on-demand, and virtualized resources for users. In this style of computing, users can access a shared pool of computing resources which are prov... Cloud can be defined as a new computing paradigm that provides scalable, on-demand, and virtualized resources for users. In this style of computing, users can access a shared pool of computing resources which are provisioned with minimal management efforts of users. Yet there are some obstacles and concerns about the use of clouds. Guaranteeing quality of service QoS by service providers can be regarded as one of the main concerns for companies tending to use it. Service provisioning in clouds is based on service level agreements representing a contract negotiated between users and providers. According to this contract, if a provider cannot satisfy its agreed application requirements, it should pay penalties as compensation. In this paper, we intend to carry out a comprehensive survey on the models proposed in literature with respect to the implementation principles to address the QoS guarantee issue. © 2014 Chinese Association of Automation. 展开更多
关键词 cloud computing distributed computer systems System of systems Systems engineering Telecommunication services Web services
下载PDF
Intelligent Ironmaking Optimization Service on a Cloud Computing Platform by Digital Twin 被引量:3
8
作者 Heng Zhou Chunjie Yang Youxian Sun 《Engineering》 SCIE EI 2021年第9期1274-1281,共8页
The shortage of computation methods and storage devices has largely limited the development of multiobjective optimization in industrial processes.To improve the operational levels of the process industries,we propose... The shortage of computation methods and storage devices has largely limited the development of multiobjective optimization in industrial processes.To improve the operational levels of the process industries,we propose a multi-objective optimization framework based on cloud services and a cloud distribution system.Real-time data from manufacturing procedures are first temporarily stored in a local database,and then transferred to the relational database in the cloud.Next,a distribution system with elastic compute power is set up for the optimization framework.Finally,a multi-objective optimization model based on deep learning and an evolutionary algorithm is proposed to optimize several conflicting goals of the blast furnace ironmaking process.With the application of this optimization service in a cloud factory,iron production was found to increase by 83.91 t∙d^(-1),the coke ratio decreased 13.50 kg∙t^(-1),and the silicon content decreased by an average of 0.047%. 展开更多
关键词 cloud factory Blast furnace Multi-objective optimization distributed computation
下载PDF
An Effective Non-Commutative Encryption Approach with Optimized Genetic Algorithm for Ensuring Data Protection in Cloud Computing 被引量:2
9
作者 S.Jerald Nirmal Kumar S.Ravimaran M.M.Gowthul Alam 《Computer Modeling in Engineering & Sciences》 SCIE EI 2020年第11期671-697,共27页
Nowadays,succeeding safe communication and protection-sensitive data from unauthorized access above public networks are the main worries in cloud servers.Hence,to secure both data and keys ensuring secured data storag... Nowadays,succeeding safe communication and protection-sensitive data from unauthorized access above public networks are the main worries in cloud servers.Hence,to secure both data and keys ensuring secured data storage and access,our proposed work designs a Novel Quantum Key Distribution(QKD)relying upon a non-commutative encryption framework.It makes use of a Novel Quantum Key Distribution approach,which guarantees high level secured data transmission.Along with this,a shared secret is generated using Diffie Hellman(DH)to certify secured key generation at reduced time complexity.Moreover,a non-commutative approach is used,which effectively allows the users to store and access the encrypted data into the cloud server.Also,to prevent data loss or corruption caused by the insiders in the cloud,Optimized Genetic Algorithm(OGA)is utilized,which effectively recovers the data and retrieve it if the missed data without loss.It is then followed with the decryption process as if requested by the user.Thus our proposed framework ensures authentication and paves way for secure data access,with enhanced performance and reduced complexities experienced with the prior works. 展开更多
关键词 cloud computing quantum key distribution Diffie Hellman non-commutative approach genetic algorithm particle swarm optimization
下载PDF
Adaptive Butterfly Optimization Algorithm(ABOA)Based Feature Selection and Deep Neural Network(DNN)for Detection of Distributed Denial-of-Service(DDoS)Attacks in Cloud
10
作者 S.Sureshkumar G.K.D.Prasanna Venkatesan R.Santhosh 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期1109-1123,共15页
Cloud computing technology provides flexible,on-demand,and completely controlled computing resources and services are highly desirable.Despite this,with its distributed and dynamic nature and shortcomings in virtualiz... Cloud computing technology provides flexible,on-demand,and completely controlled computing resources and services are highly desirable.Despite this,with its distributed and dynamic nature and shortcomings in virtualization deployment,the cloud environment is exposed to a wide variety of cyber-attacks and security difficulties.The Intrusion Detection System(IDS)is a specialized security tool that network professionals use for the safety and security of the networks against attacks launched from various sources.DDoS attacks are becoming more frequent and powerful,and their attack pathways are continually changing,which requiring the development of new detection methods.Here the purpose of the study is to improve detection accuracy.Feature Selection(FS)is critical.At the same time,the IDS’s computational problem is limited by focusing on the most relevant elements,and its performance and accuracy increase.In this research work,the suggested Adaptive butterfly optimization algorithm(ABOA)framework is used to assess the effectiveness of a reduced feature subset during the feature selection phase,that was motivated by this motive Candidates.Accurate classification is not compromised by using an ABOA technique.The design of Deep Neural Networks(DNN)has simplified the categorization of network traffic into normal and DDoS threat traffic.DNN’s parameters can be finetuned to detect DDoS attacks better using specially built algorithms.Reduced reconstruction error,no exploding or vanishing gradients,and reduced network are all benefits of the changes outlined in this paper.When it comes to performance criteria like accuracy,precision,recall,and F1-Score are the performance measures that show the suggested architecture outperforms the other existing approaches.Hence the proposed ABOA+DNN is an excellent method for obtaining accurate predictions,with an improved accuracy rate of 99.05%compared to other existing approaches. 展开更多
关键词 cloud computing distributed denial of service intrusion detection system adaptive butterfly optimization algorithm deep neural network
下载PDF
Survey on Three Components of Mobile Cloud Computing: Offloading, Distribution and Privacy 被引量:2
11
作者 Anirudh Paranjothi Mohammad S. Khan Mais Nijim 《Journal of Computer and Communications》 2017年第6期1-31,共31页
Mobile Cloud Computing (MCC) brings rich computational resource to mobile users, network operators, and cloud computing providers. It can be represented in many ways, and the ultimate goal of MCC is to enable executio... Mobile Cloud Computing (MCC) brings rich computational resource to mobile users, network operators, and cloud computing providers. It can be represented in many ways, and the ultimate goal of MCC is to enable execution of rich mobile application with rich user experience. Mobility is one of the main characteristics of MCC environment where user can be able to continue their work regardless of movement. This literature review paper presents the state-of-the-art survey of MCC. Also, we provide the communication architecture of MCC and taxonomy of mobile cloud in which specifically concentrates on offloading, mobile distribution computing, and privacy. Through an extensive literature review, we found that MCC is a technologically beneficial and expedient paradigm for virtual environments in terms of virtual servers in a distributed environment, multi-tenant architecture and data storing in a cloud. We further identified the drawbacks in offloading, mobile distribution computing, privacy of MCC and how this technology can be used in an effective way. 展开更多
关键词 cloud computing Mobile cloud computing OFFLOADING DISTRIBUTION and PRIVACY
下载PDF
Residential Electricity Classification Method Based On Cloud Computing Platform and Random Forest 被引量:2
12
作者 Ming Li Zhong Fang +5 位作者 Wanwan Cao Yong Ma Shang Wu Yang Guo Yu Xue Romany F.Mansour 《Computer Systems Science & Engineering》 SCIE EI 2021年第7期39-46,共8页
With the rapid development and popularization of new-generation technologies such as cloud computing,big data,and artificial intelligence,the construction of smart grids has become more diversified.Accurate quick read... With the rapid development and popularization of new-generation technologies such as cloud computing,big data,and artificial intelligence,the construction of smart grids has become more diversified.Accurate quick reading and classification of the electricity consumption of residential users can provide a more in-depth perception of the actual power consumption of residents,which is essential to ensure the normal operation of the power system,energy management and planning.Based on the distributed architecture of cloud computing,this paper designs an improved random forest residential electricity classification method.It uses the unique out-of-bag error of random forest and combines the Drosophila algorithm to optimize the internal parameters of the random forest,thereby improving the performance of the random forest algorithm.This method uses MapReduce to train an improved random forest model on the cloud computing platform,and then uses the trained model to analyze the residential electricity consumption data set,divides all residents into 5 categories,and verifies the effectiveness of the model through experiments and feasibility. 展开更多
关键词 cloud computing hadoop random forest user classification
下载PDF
Trusted Heartbeat Framework for Cloud Computing 被引量:1
13
作者 Dipen Contractor Dhiren Patel Shreya Patel 《Journal of Information Security》 2016年第3期103-111,共9页
In cloud computing environment, as the infrastructure not owned by users, it is desirable that its security and integrity must be protected and verified time to time. In Hadoop based scalable computing setup, malfunct... In cloud computing environment, as the infrastructure not owned by users, it is desirable that its security and integrity must be protected and verified time to time. In Hadoop based scalable computing setup, malfunctioning nodes generate wrong output during the run time. To detect such nodes, we create collaborative network between worker node (i.e. data node of Hadoop) and Master node (i.e. name node of Hadoop) with the help of trusted heartbeat framework (THF). We propose procedures to register node and to alter status of node based on reputation provided by other co-worker nodes. 展开更多
关键词 Trusted Heartbeat cloud computing hadoop Framework REPUTATION Attestation
下载PDF
基于Hadoop的海量工程数据处理技术研究
14
作者 郭雅婷 龚道文 李茜 《移动信息》 2024年第10期282-284,共3页
随着信息技术的快速发展,工程领域中产生的数据量也在爆炸性增长。这些海量数据的有效处理和分析对工程决策、优化和创新至关重要。作为一种开源的分布式存储和计算框架,Hadoop以其高可靠性、高扩展性和高效性,成为处理大规模数据的首... 随着信息技术的快速发展,工程领域中产生的数据量也在爆炸性增长。这些海量数据的有效处理和分析对工程决策、优化和创新至关重要。作为一种开源的分布式存储和计算框架,Hadoop以其高可靠性、高扩展性和高效性,成为处理大规模数据的首选技术。文中探讨了基于Hadoop的海量工程数据处理技术,分析了其在工程数据处理中的应用优势和面临的挑战,并提出了相应的优化策略,揭示了Hadoop在处理工程数据中的潜力和局限,为工程领域的数据处理提供了新的视角和方法。 展开更多
关键词 hadoop 海量数据 工程数据处理 分布式计算 数据分析
下载PDF
Interpurchase Time of Customer Behavior in Cloud Computing
15
作者 Hui-Hsin Huang 《Journal of Electronic Science and Technology》 CAS 2013年第2期197-200,共4页
Cloud computing is an increasingly popular paradigm for accessing computing resources. For marketing application, this paper proposes a dynamic model of customer interpurchase time with geometric distribution. This mo... Cloud computing is an increasingly popular paradigm for accessing computing resources. For marketing application, this paper proposes a dynamic model of customer interpurchase time with geometric distribution. This model considers that there is a change point in interpurchase time and two types of probability density functions are demonstrated (time decreasing before changing; time increasing after changing). With the description of change point, Bernoulli and Poisson distributions also are discussed in the model construction. 展开更多
关键词 cloud computing change point geometric distribution interpurchase time.
下载PDF
Systematic Cloud-Based Optimization: Twin-Fold Moth Flame Algorithm for VM Deployment and Load-Balancing
16
作者 Umer Nauman Yuhong Zhang +1 位作者 Zhihui Li Tong Zhen 《Intelligent Automation & Soft Computing》 2024年第3期477-510,共34页
Cloud computing has gained significant recognition due to its ability to provide a broad range of online services and applications.Nevertheless,existing commercial cloud computing models demonstrate an appropriate des... Cloud computing has gained significant recognition due to its ability to provide a broad range of online services and applications.Nevertheless,existing commercial cloud computing models demonstrate an appropriate design by concentrating computational assets,such as preservation and server infrastructure,in a limited number of large-scale worldwide data facilities.Optimizing the deployment of virtual machines(VMs)is crucial in this scenario to ensure system dependability,performance,and minimal latency.A significant barrier in the present scenario is the load distribution,particularly when striving for improved energy consumption in a hypothetical grid computing framework.This design employs load-balancing techniques to allocate different user workloads across several virtual machines.To address this challenge,we propose using the twin-fold moth flame technique,which serves as a very effective optimization technique.Developers intentionally designed the twin-fold moth flame method to consider various restrictions,including energy efficiency,lifespan analysis,and resource expenditures.It provides a thorough approach to evaluating total costs in the cloud computing environment.When assessing the efficacy of our suggested strategy,the study will analyze significant metrics such as energy efficiency,lifespan analysis,and resource expenditures.This investigation aims to enhance cloud computing techniques by developing a new optimization algorithm that considers multiple factors for effective virtual machine placement and load balancing.The proposed work demonstrates notable improvements of 12.15%,10.68%,8.70%,13.29%,18.46%,and 33.39%for 40 count data of nodes using the artificial bee colony-bat algorithm,ant colony optimization,crow search algorithm,krill herd,whale optimization genetic algorithm,and improved Lévy-based whale optimization algorithm,respectively. 展开更多
关键词 Optimizing cloud computing deployment of virtual machines LOAD-BALANCING twin-fold moth flame algorithm grid computing computational resource distribution data virtualization
下载PDF
Cloud Computing Technology and Its Applications
17
作者 Zhao Pei, Lu Ping, Luo Shengmei (ZTE Corporation, Nanjing 210012, P. R. China) 《ZTE Communications》 2010年第4期34-38,共5页
Virtualization and distributed parallel architecture are typical cloud computing technologies. In the area of virtuatization technology, this article discusses physical resource pooling, resource pool management and u... Virtualization and distributed parallel architecture are typical cloud computing technologies. In the area of virtuatization technology, this article discusses physical resource pooling, resource pool management and use, cluster fault location and maintenance, resource pool grouping, and construction and application of heterogeneous virtualization platforms. In the area of distributed technology, distributed file system and KeyNalue storage engine are discussed. A solution is proposed for the host bottleneck problem, and a standard storage interface is proposed for the distributed file system. A directory-based storage scheme for Key/Value storage engine is also proposed. 展开更多
关键词 VIRTUALIZATION distributed computing cloud computing management platform key/value storage engine
下载PDF
QKD in Cloud-Fog Computing for Personal Health Record
18
作者 L.Arulmozhiselvan E.Uma 《Computer Systems Science & Engineering》 SCIE EI 2022年第10期45-57,共13页
Cloud computing is a rapid growing technology which delivers computing services such as servers,storage,database,networking,software and analytics.It has brought a new way to securely store and share information and d... Cloud computing is a rapid growing technology which delivers computing services such as servers,storage,database,networking,software and analytics.It has brought a new way to securely store and share information and data with multiple users.When authorized person access these clouds,the released data should not compromise any individual’s privacy and identity should not be revealed.Fog Computing is the extension of cloud with decentralized structure which stores the data in locations somewhere between the data source and cloud.The goal of fog computing is to provide high security,improve performance and network efficiency.We use quantum key distribution to produce and distribute key which change its quantum state and key,when key is known by mediator and it has ability to detect presence of mediator trying to gain lore of the key.In this paper,we introduced sugar-salt encryption which overcomes brute-force attack in effect delivers phony data in return to every incorrect guess of the password or key. 展开更多
关键词 Security cloud computing fog computing quantum key distribution sugar-salt encryption
下载PDF
Resource Load Prediction of Internet of Vehicles Mobile Cloud Computing
19
作者 Wenbin Bi Fang Yu +1 位作者 Ning Cao Russell Higgs 《Computers, Materials & Continua》 SCIE EI 2022年第10期165-180,共16页
Load-time series data in mobile cloud computing of Internet of Vehicles(IoV)usually have linear and nonlinear composite characteristics.In order to accurately describe the dynamic change trend of such loads,this study... Load-time series data in mobile cloud computing of Internet of Vehicles(IoV)usually have linear and nonlinear composite characteristics.In order to accurately describe the dynamic change trend of such loads,this study designs a load prediction method by using the resource scheduling model for mobile cloud computing of IoV.Firstly,a chaotic analysis algorithm is implemented to process the load-time series,while some learning samples of load prediction are constructed.Secondly,a support vector machine(SVM)is used to establish a load prediction model,and an improved artificial bee colony(IABC)function is designed to enhance the learning ability of the SVM.Finally,a CloudSim simulation platform is created to select the perminute CPU load history data in the mobile cloud computing system,which is composed of 50 vehicles as the data set;and a comparison experiment is conducted by using a grey model,a back propagation neural network,a radial basis function(RBF)neural network and a RBF kernel function of SVM.As shown in the experimental results,the prediction accuracy of the method proposed in this study is significantly higher than other models,with a significantly reduced real-time prediction error for resource loading in mobile cloud environments.Compared with single-prediction models,the prediction method proposed can build up multidimensional time series in capturing complex load time series,fit and describe the load change trends,approximate the load time variability more precisely,and deliver strong generalization ability to load prediction models for mobile cloud computing resources. 展开更多
关键词 Internet of Vehicles mobile cloud computing resource load predicting multi distributed resource computing scheduling chaos analysis algorithm improved artificial bee colony function
下载PDF
The Objective Function Value Optimization of Cloud Computing Resources Security Allocation of Artificial Firefly Algorithm
20
作者 Xiaoxi Hu 《Open Journal of Optimization》 2015年第2期40-46,共7页
Based on the current cloud computing resources security distribution model’s problem that the optimization effect is not high and the convergence is not good, this paper puts forward a cloud computing resources secur... Based on the current cloud computing resources security distribution model’s problem that the optimization effect is not high and the convergence is not good, this paper puts forward a cloud computing resources security distribution model based on improved artificial firefly algorithm. First of all, according to characteristics of the artificial fireflies swarm algorithm and the complex method, it incorporates the ideas of complex method into the artificial firefly algorithm, uses the complex method to guide the search of artificial fireflies in population, and then introduces local search operator in the firefly mobile mechanism, in order to improve the searching efficiency and convergence precision of algorithm. Simulation results show that, the cloud computing resources security distribution model based on improved artificial firefly algorithm proposed in this paper has good convergence effect and optimum efficiency. 展开更多
关键词 cloud computing RESOURCES SECURITY Distribution Improved Artificial FIREFLY Algorithm Complex Method Local Search OPERATOR
下载PDF
上一页 1 2 79 下一页 到第
使用帮助 返回顶部