期刊文献+
共找到57,927篇文章
< 1 2 250 >
每页显示 20 50 100
Information Security in the Cloud: Emerging Trends and Challenges
1
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 cloud Computing Information Security cloud Infrastructure Offerings cloud Migration Security Measures Data Breaches cloud Service Providers CYBERSECURITY cloud Security Case Studies cloud Threat Landscape Data Encryption COMPLIANCE cloud Security Tools
下载PDF
Large Eddy Simulation of Vertical Structure and Size Density of Deep Layer Clouds
2
作者 Bangjun CAO Xianyu YANG +2 位作者 Jun WEN Qin HU Ziyuan ZHU 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第8期1629-1642,1668-1670,共17页
In a convective scheme featuring a discretized cloud size density, the assumed lateral mixing rate is inversely proportional to the exponential coefficient of plume size. This follows a typical assumption of-1, but it... In a convective scheme featuring a discretized cloud size density, the assumed lateral mixing rate is inversely proportional to the exponential coefficient of plume size. This follows a typical assumption of-1, but it has unveiled inherent uncertainties, especially for deep layer clouds. Addressing this knowledge gap, we conducted comprehensive large eddy simulations and comparative analyses focused on terrestrial regions. Our investigation revealed that cloud formation adheres to the tenets of Bernoulli trials, illustrating power-law scaling that remains consistent regardless of the inherent deep layer cloud attributes existing between cloud size and the number of clouds. This scaling paradigm encompasses liquid, ice, and mixed phases in deep layer clouds. The exponent characterizing the interplay between cloud scale and number in the deep layer cloud, specifically for liquid, ice, or mixed-phase clouds, resembles that of shallow convection,but converges closely to zero. This convergence signifies a propensity for diminished cloud numbers and sizes within deep layer clouds. Notably, the infusion of abundant moisture and the release of latent heat by condensation within the lower atmospheric strata make substantial contributions. However, this role in ice phase formation is limited. The emergence of liquid and ice phases in deep layer clouds is facilitated by the latent heat and influenced by the wind shear inherent in the middle levels. These interrelationships hold potential applications in formulating parameterizations and post-processing model outcomes. 展开更多
关键词 deep layer cloud cloud spatial structure cloud size density large eddy simulation
下载PDF
The Spatiotemporal Distribution Characteristics of Cloud Types and Phases in the Arctic Based on CloudSat and CALIPSO Cloud Classification Products
3
作者 Yue SUN Huiling YANG +5 位作者 Hui XIAO Liang FENG Wei CHENG Libo ZHOU Weixi SHU Jingzhe SUN 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第2期310-324,共15页
The cloud type product 2B-CLDCLASS-LIDAR based on CloudSat and CALIPSO from June 2006 to May 2017 is used to examine the temporal and spatial distribution characteristics and interannual variability of eight cloud typ... The cloud type product 2B-CLDCLASS-LIDAR based on CloudSat and CALIPSO from June 2006 to May 2017 is used to examine the temporal and spatial distribution characteristics and interannual variability of eight cloud types(high cloud, altostratus, altocumulus, stratus, stratocumulus, cumulus, nimbostratus, and deep convection) and three phases(ice,mixed, and water) in the Arctic. Possible reasons for the observed interannual variability are also discussed. The main conclusions are as follows:(1) More water clouds occur on the Atlantic side, and more ice clouds occur over continents.(2)The average spatial and seasonal distributions of cloud types show three patterns: high clouds and most cumuliform clouds are concentrated in low-latitude locations and peak in summer;altostratus and nimbostratus are concentrated over and around continents and are less abundant in summer;stratocumulus and stratus are concentrated near the inner Arctic and peak during spring and autumn.(3) Regional averaged interannual frequencies of ice clouds and altostratus clouds significantly decrease, while those of water clouds, altocumulus, and cumulus clouds increase significantly.(4) Significant features of the linear trends of cloud frequencies are mainly located over ocean areas.(5) The monthly water cloud frequency anomalies are positively correlated with air temperature in most of the troposphere, while those for ice clouds are negatively correlated.(6) The decrease in altostratus clouds is associated with the weakening of the Arctic front due to Arctic warming, while increased water vapor transport into the Arctic and higher atmospheric instability lead to more cumulus and altocumulus clouds. 展开更多
关键词 cloudSat and CALIPSO cloud type cloud phase temporal and spatial distribution interannual variation
下载PDF
Cloud Datacenter Selection Using Service Broker Policies:A Survey
4
作者 Salam Al-E’mari Yousef Sanjalawe +2 位作者 Ahmad Al-Daraiseh Mohammad Bany Taha Mohammad Aladaileh 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期1-41,共41页
Amid the landscape of Cloud Computing(CC),the Cloud Datacenter(DC)stands as a conglomerate of physical servers,whose performance can be hindered by bottlenecks within the realm of proliferating CC services.A linchpin ... Amid the landscape of Cloud Computing(CC),the Cloud Datacenter(DC)stands as a conglomerate of physical servers,whose performance can be hindered by bottlenecks within the realm of proliferating CC services.A linchpin in CC’s performance,the Cloud Service Broker(CSB),orchestrates DC selection.Failure to adroitly route user requests with suitable DCs transforms the CSB into a bottleneck,endangering service quality.To tackle this,deploying an efficient CSB policy becomes imperative,optimizing DC selection to meet stringent Qualityof-Service(QoS)demands.Amidst numerous CSB policies,their implementation grapples with challenges like costs and availability.This article undertakes a holistic review of diverse CSB policies,concurrently surveying the predicaments confronted by current policies.The foremost objective is to pinpoint research gaps and remedies to invigorate future policy development.Additionally,it extensively clarifies various DC selection methodologies employed in CC,enriching practitioners and researchers alike.Employing synthetic analysis,the article systematically assesses and compares myriad DC selection techniques.These analytical insights equip decision-makers with a pragmatic framework to discern the apt technique for their needs.In summation,this discourse resoundingly underscores the paramount importance of adept CSB policies in DC selection,highlighting the imperative role of efficient CSB policies in optimizing CC performance.By emphasizing the significance of these policies and their modeling implications,the article contributes to both the general modeling discourse and its practical applications in the CC domain. 展开更多
关键词 cloud computing cloud service broker datacenter selection QUALITY-OF-SERVICE user request
下载PDF
Improving Satellite-Retrieved Cloud Base Height with Ground-Based Cloud Radar Measurements
5
作者 Zhonghui TAN Ju WANG +3 位作者 Jianping GUO Chao LIU Miao ZHANG Shuo MA 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第11期2131-2140,共10页
Cloud base height(CBH) is a crucial parameter for cloud radiative effect estimates, climate change simulations, and aviation guidance. However, due to the limited information on cloud vertical structures included in p... Cloud base height(CBH) is a crucial parameter for cloud radiative effect estimates, climate change simulations, and aviation guidance. However, due to the limited information on cloud vertical structures included in passive satellite radiometer observations, few operational satellite CBH products are currently available. This study presents a new method for retrieving CBH from satellite radiometers. The method first uses the combined measurements of satellite radiometers and ground-based cloud radars to develop a lookup table(LUT) of effective cloud water content(ECWC), representing the vertically varying cloud water content. This LUT allows for the conversion of cloud water path to cloud geometric thickness(CGT), enabling the estimation of CBH as the difference between cloud top height and CGT. Detailed comparative analysis of CBH estimates from the state-of-the-art ECWC LUT are conducted against four ground-based millimeter-wave cloud radar(MMCR) measurements, and results show that the mean bias(correlation coefficient) is0.18±1.79 km(0.73), which is lower(higher) than 0.23±2.11 km(0.67) as derived from the combined measurements of satellite radiometers and satellite radar-lidar(i.e., Cloud Sat and CALIPSO). Furthermore, the percentages of the CBH biases within 250 m increase by 5% to 10%, which varies by location. This indicates that the CBH estimates from our algorithm are more consistent with ground-based MMCR measurements. Therefore, this algorithm shows great potential for further improvement of the CBH retrievals as ground-based MMCR are being increasingly included in global surface meteorological observing networks, and the improved CBH retrievals will contribute to better cloud radiative effect estimates. 展开更多
关键词 cloud base height passive radiometer ground-based cloud radar remote sensing
下载PDF
Intelligent Solution System for Cloud Security Based on Equity Distribution:Model and Algorithms
6
作者 Sarah Mustafa Eljack Mahdi Jemmali +3 位作者 Mohsen Denden Mutasim Al Sadig Abdullah M.Algashami Sadok Turki 《Computers, Materials & Continua》 SCIE EI 2024年第1期1461-1479,共19页
In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding ... In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding the risk of data loss and data overlapping.The development of data flow scheduling approaches in the cloud environment taking security parameters into account is insufficient.In our work,we propose a data scheduling model for the cloud environment.Themodel is made up of three parts that together help dispatch user data flow to the appropriate cloudVMs.The first component is the Collector Agent whichmust periodically collect information on the state of the network links.The second one is the monitoring agent which must then analyze,classify,and make a decision on the state of the link and finally transmit this information to the scheduler.The third one is the scheduler who must consider previous information to transfer user data,including fair distribution and reliable paths.It should be noted that each part of the proposedmodel requires the development of its algorithms.In this article,we are interested in the development of data transfer algorithms,including fairness distribution with the consideration of a stable link state.These algorithms are based on the grouping of transmitted files and the iterative method.The proposed algorithms showthe performances to obtain an approximate solution to the studied problem which is an NP-hard(Non-Polynomial solution)problem.The experimental results show that the best algorithm is the half-grouped minimum excluding(HME),with a percentage of 91.3%,an average deviation of 0.042,and an execution time of 0.001 s. 展开更多
关键词 Cyber-security cloud computing cloud security ALGORITHMS HEURISTICS
下载PDF
Analysis of Secured Cloud Data Storage Model for Information
7
作者 Emmanuel Nwabueze Ekwonwune Udo Chukwuebuka Chigozie +1 位作者 Duroha Austin Ekekwe Georgina Chekwube Nwankwo 《Journal of Software Engineering and Applications》 2024年第5期297-320,共24页
This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hac... This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system. 展开更多
关键词 cloud DATA Information Model Data Storage cloud Computing Security System Data Encryption
下载PDF
Enhancing Cybersecurity through Cloud Computing Solutions in the United States
8
作者 Omolola F. Hassan Folorunsho O. Fatai +4 位作者 Oluwadare Aderibigbe Abdullah Oladoyin Akinde Tolulope Onasanya Mariam Adetoun Sanusi Oduwunmi Odukoya 《Intelligent Information Management》 2024年第4期176-193,共18页
This study investigates how cybersecurity can be enhanced through cloud computing solutions in the United States. The motive for this study is due to the rampant loss of data, breaches, and unauthorized access of inte... This study investigates how cybersecurity can be enhanced through cloud computing solutions in the United States. The motive for this study is due to the rampant loss of data, breaches, and unauthorized access of internet criminals in the United States. The study adopted a survey research design, collecting data from 890 cloud professionals with relevant knowledge of cybersecurity and cloud computing. A machine learning approach was adopted, specifically a random forest classifier, an ensemble, and a decision tree model. Out of the features in the data, ten important features were selected using random forest feature importance, which helps to achieve the objective of the study. The study’s purpose is to enable organizations to develop suitable techniques to prevent cybercrime using random forest predictions as they relate to cloud services in the United States. The effectiveness of the models used is evaluated by utilizing validation matrices that include recall values, accuracy, and precision, in addition to F1 scores and confusion matrices. Based on evaluation scores (accuracy, precision, recall, and F1 scores) of 81.9%, 82.6%, and 82.1%, the results demonstrated the effectiveness of the random forest model. It showed the importance of machine learning algorithms in preventing cybercrime and boosting security in the cloud environment. It recommends that other machine learning models be adopted to see how to improve cybersecurity through cloud computing. 展开更多
关键词 CYBERSECURITY cloud Computing cloud Solutions Machine Learning Algorithm
下载PDF
Security Implications of Edge Computing in Cloud Networks
9
作者 Sina Ahmadi 《Journal of Computer and Communications》 2024年第2期26-46,共21页
Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this r... Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques. 展开更多
关键词 Edge Computing cloud Networks Artificial Intelligence Machine Learning cloud Security
下载PDF
Building Facade Point Clouds Segmentation Based on Optimal Dual-Scale Feature Descriptors
10
作者 Zijian Zhang Jicang Wu 《Journal of Computer and Communications》 2024年第6期226-245,共20页
To address the current issues of inaccurate segmentation and the limited applicability of segmentation methods for building facades in point clouds, we propose a facade segmentation algorithm based on optimal dual-sca... To address the current issues of inaccurate segmentation and the limited applicability of segmentation methods for building facades in point clouds, we propose a facade segmentation algorithm based on optimal dual-scale feature descriptors. First, we select the optimal dual-scale descriptors from a range of feature descriptors. Next, we segment the facade according to the threshold value of the chosen optimal dual-scale descriptors. Finally, we use RANSAC (Random Sample Consensus) to fit the segmented surface and optimize the fitting result. Experimental results show that, compared to commonly used facade segmentation algorithms, the proposed method yields more accurate segmentation results, providing a robust data foundation for subsequent 3D model reconstruction of buildings. 展开更多
关键词 3D Laser Scanning Point clouds Building Facade Segmentation Point cloud Processing Feature Descriptors
下载PDF
The Future of Cloud Computing: Benefits and Challenges
11
作者 Rafia Islam Vardhan Patamsetti +4 位作者 Aparna Gadhi Ragha Madhavi Gondu Chinna Manikanta Bandaru Sai Chaitanya Kesani Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2023年第4期53-65,共13页
The purpose of this paper is to provide a better knowledge of the cloud computing as well as to suggest relevant research paths in this growing field. Also, we will go through the future benefits of cloud computing an... The purpose of this paper is to provide a better knowledge of the cloud computing as well as to suggest relevant research paths in this growing field. Also, we will go through the future benefits of cloud computing and the upcoming possible challenges we will have. Intext Cloud, performance, cloud computing, architecture, scale-up, and big data are all terms used in this context. Cloud computing offers a wide range of architectural configurations, including the number of processors, memory, and nodes. Cloud computing has already changed the way we store, process, and access data, and it is expected to continue to have a significant impact on the future of information technology. Cloud computing enables organizations to scale their IT resources up or down quickly and easily, without the need for costly hardware upgrades. This can help organizations to respond more quickly to changing business needs and market conditions. By moving IT resources to the cloud, organizations can reduce their IT infrastructure costs and improve their operational efficiency. Cloud computing also allows organizations to pay only for the resources they use, rather than investing in expensive hardware and software licenses. Cloud providers invest heavily in security and compliance measures, which can help to protect organizations from cyber threats and ensure regulatory compliance. Cloud computing provides a scalable platform for AI and machine learning applications, enabling organizations to build and deploy these technologies more easily and cost-effectively. A task, an application, and its input can take up to 20 times longer or cost 10 times more than optimal. Cloud products’ ready adaptability has resulted in a paradigm change. Previously, an application was optimized for a specific cluster;however, in the cloud, the architectural configuration is tuned for the workload. The evolution of cloud computing from the era of mainframes and dumb terminals has been significant, but there are still many advancements to come. As we look towards the future, IT leaders and the companies they serve will face increasingly complex challenges in order to stay competitive in a constantly evolving cloud computing landscape. Additionally, it will be crucial to remain compliant with existing regulations as well as new regulations that may emerge in the future. It is safe to say that the next decade of cloud computing will be just as dramatic as the last where many internet services are becoming cloud-based, and huge enterprises will struggle to fund physical infrastructure. Cloud computing is significantly used in business innovation and because of its agility and adaptability, cloud technology enables new ways of working, operating, and running a business. The service enables users to access files and applications stored in the cloud from anywhere, removing the requirement for users to be always physically close to actual hardware. Cloud computing makes the connection available from anywhere because they are kept on a network of hosted computers that carry data over the internet. Cloud computing has shown to be advantageous to both consumers and corporations. To be more specific, the cloud has altered our way of life. Overall, cloud computing is likely to continue to play a significant role in the future of IT, enabling organizations to become more agile, efficient, and innovative in the face of rapid technological change. This is likely to drive further innovation in AI and machine learning in the coming years. 展开更多
关键词 cloud Computing Computing Service Private clouds Public clouds Hybrid clouds Multi-clouds
下载PDF
基于Spring Cloud的分布式医疗数据平台建设
12
作者 汪睿 胡珊珊 +1 位作者 陈敏莲 徐骁 《设备管理与维修》 2024年第4期16-19,共4页
为解决互联网时代医疗大数据的可靠存储问题,探索异构数据的有效处理方案,加强医疗数据检索能力。提出一种基于Spring Cloud的分布式医疗数据平台建设方案,该方案通过Spring Cloud技术构建分布式架构,选取MongoDB非关系型数据库作为分... 为解决互联网时代医疗大数据的可靠存储问题,探索异构数据的有效处理方案,加强医疗数据检索能力。提出一种基于Spring Cloud的分布式医疗数据平台建设方案,该方案通过Spring Cloud技术构建分布式架构,选取MongoDB非关系型数据库作为分布式存储,同时对数据进行标准化、分词等操作,从而实现一个异构数据可存储、系统高可用、规模易扩展、检索高效率的医疗数据平台。 展开更多
关键词 分布式 医疗数据 Spring cloud MONGODB
下载PDF
Point Cloud Classification Using Content-Based Transformer via Clustering in Feature Space 被引量:1
13
作者 Yahui Liu Bin Tian +2 位作者 Yisheng Lv Lingxi Li Fei-Yue Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期231-239,共9页
Recently, there have been some attempts of Transformer in 3D point cloud classification. In order to reduce computations, most existing methods focus on local spatial attention,but ignore their content and fail to est... Recently, there have been some attempts of Transformer in 3D point cloud classification. In order to reduce computations, most existing methods focus on local spatial attention,but ignore their content and fail to establish relationships between distant but relevant points. To overcome the limitation of local spatial attention, we propose a point content-based Transformer architecture, called PointConT for short. It exploits the locality of points in the feature space(content-based), which clusters the sampled points with similar features into the same class and computes the self-attention within each class, thus enabling an effective trade-off between capturing long-range dependencies and computational complexity. We further introduce an inception feature aggregator for point cloud classification, which uses parallel structures to aggregate high-frequency and low-frequency information in each branch separately. Extensive experiments show that our PointConT model achieves a remarkable performance on point cloud shape classification. Especially, our method exhibits 90.3% Top-1 accuracy on the hardest setting of ScanObjectN N. Source code of this paper is available at https://github.com/yahuiliu99/PointC onT. 展开更多
关键词 Content-based Transformer deep learning feature aggregator local attention point cloud classification
下载PDF
Automatic Extraction Method of 3D Feature Guidelines for Complex Cultural Relic Surfaces Based on Point Cloud 被引量:1
14
作者 GENG Yuxin ZHONG Ruofei +1 位作者 HUANG Yuqin SUN Haili 《Journal of Geodesy and Geoinformation Science》 CSCD 2024年第1期16-41,共26页
Cultural relics line graphic serves as a crucial form of traditional artifact information documentation,which is a simple and intuitive product with low cost of displaying compared with 3D models.Dimensionality reduct... Cultural relics line graphic serves as a crucial form of traditional artifact information documentation,which is a simple and intuitive product with low cost of displaying compared with 3D models.Dimensionality reduction is undoubtedly necessary for line drawings.However,most existing methods for artifact drawing rely on the principles of orthographic projection that always cannot avoid angle occlusion and data overlapping while the surface of cultural relics is complex.Therefore,conformal mapping was introduced as a dimensionality reduction way to compensate for the limitation of orthographic projection.Based on the given criteria for assessing surface complexity,this paper proposed a three-dimensional feature guideline extraction method for complex cultural relic surfaces.A 2D and 3D combined factor that measured the importance of points on describing surface features,vertex weight,was designed.Then the selection threshold for feature guideline extraction was determined based on the differences between vertex weight and shape index distributions.The feasibility and stability were verified through experiments conducted on real cultural relic surface data.Results demonstrated the ability of the method to address the challenges associated with the automatic generation of line drawings for complex surfaces.The extraction method and the obtained results will be useful for line graphic drawing,displaying and propaganda of cultural relics. 展开更多
关键词 point cloud conformal parameterization vertex weight surface mesh cultural relics feature extraction
下载PDF
基于Spring Cloud微服务架构的非物质文化遗产展示与学习系统的设计与实现
15
作者 杜俊 李金忠 +1 位作者 何新武 李志鸿 《广东轻工职业技术学院学报》 2024年第1期14-21,共8页
针对目前人民群众对非物质文化遗产认识不够全面,以及市面上利用系统软件来有效保护和传承非物质文化遗产的软件很缺乏等问题,结合相应软件开发技术和数字可视化技术,设计和实现了一款非物质文化遗产展示与学习系统以实现对非物质文化... 针对目前人民群众对非物质文化遗产认识不够全面,以及市面上利用系统软件来有效保护和传承非物质文化遗产的软件很缺乏等问题,结合相应软件开发技术和数字可视化技术,设计和实现了一款非物质文化遗产展示与学习系统以实现对非物质文化遗产项目的传承和保护创新。本系统以江西省范围内的主要非物质文化遗产项目为例,设置有移动App端和PC端,采用前后端分离的开发模式,以当前主流的Spring Cloud微服务架构技术为基础,结合SpringBoot框架,在华为云服务器上搭建起弹性可伸缩的后端服务。使用Uni-App开发移动端,以解决无法在Android、IOS及各大小程序平台运行的问题。经测试,本系统具有操作简单,易于使用、维护和扩展,高并发性等优点。 展开更多
关键词 非物质文化遗产 Spring cloud微服务架构 Uni-App框架 Vue框架 ECharts可视化图表
下载PDF
基于RuoYi-Cloud的劳动教育平台建设
16
作者 张家铭 周杰 周北平 《电子技术应用》 2024年第3期92-99,共8页
为帮助学生学习劳动文化、进行劳动实践,辅助教师精准地安排和开展劳动教学活动,设计且实现了一款基于RuoYi-Cloud框架的劳动教育系统,具有劳动教育管理、选课管理、在线学习、学业预警、系统监控、数据分析等功能,使用RuoYi-Cloud框架... 为帮助学生学习劳动文化、进行劳动实践,辅助教师精准地安排和开展劳动教学活动,设计且实现了一款基于RuoYi-Cloud框架的劳动教育系统,具有劳动教育管理、选课管理、在线学习、学业预警、系统监控、数据分析等功能,使用RuoYi-Cloud框架开发降低了开发和维护成本,提高了开发效率。采用微服务架构,实现对用户友好的界面和高度可扩展的后端功能,优化了系统的响应时间和资源利用率确保系统高效运行,系统的灵活性和扩展性为未来的功能扩展提供良好的基础。系统为劳动教育实施提供可靠解决方案,通过对系统的实际应用和用户反馈,系统对劳动教育领域有一定参考价值。 展开更多
关键词 劳动教育 RuoYi-cloud 微服务 低代码
下载PDF
基于CloudSim的电力系统计算云原生模型与仿真方法
17
作者 陈元榉 刘媛媛 +3 位作者 张延旭 蔡煜 胡春潮 蔡泽祥 《电力自动化设备》 EI CSCD 北大核心 2024年第9期189-196,204,共9页
分析基于云计算的电力系统计算过程是实现资源高效利用的基础。因此,提出一种基于CloudSim的电力系统计算的云原生建模与仿真方法。基于云原生技术阐述了电力系统计算架构的关键要素,提出基于CloudSim的电力系统计算架构的云原生模型,... 分析基于云计算的电力系统计算过程是实现资源高效利用的基础。因此,提出一种基于CloudSim的电力系统计算的云原生建模与仿真方法。基于云原生技术阐述了电力系统计算架构的关键要素,提出基于CloudSim的电力系统计算架构的云原生模型,分析电力云任务调配时的资源供需平衡问题。建立基于微服务的电力云任务模型,分析微服务的处理时序逻辑及其层级关系并生成微服务队列。据此提出微服务的动态调配模型,采用微服务-容器映射策略与实体动态整合策略,实现微服务在实体间的动态映射。利用CloudSim进行仿真分析,结果证明所提方法可行且有效,可为电力云计算的资源配置、任务调度等提供基本的仿真工具与方法。 展开更多
关键词 电力系统 cloudSim 云原生建模 电力系统计算架构 动态调配 时序逻辑 微服务队列
下载PDF
基于SpringCloud框架微服务架构的融合媒体云平台设计 被引量:2
18
作者 谢颐 胡黎 《软件》 2024年第1期134-136,173,共4页
设计基于SpringCloud框架微服务架构的融合媒体云平台,提高媒体业务流程效率。对SpringCloud的基本情况与相关组件进行概述,提出融合媒体云平台设计思路与原则,以此为基础构建有三层服务层的融合媒体云平台,设计融合媒体云平台的安全,... 设计基于SpringCloud框架微服务架构的融合媒体云平台,提高媒体业务流程效率。对SpringCloud的基本情况与相关组件进行概述,提出融合媒体云平台设计思路与原则,以此为基础构建有三层服务层的融合媒体云平台,设计融合媒体云平台的安全,基于“一次采集、多种生成、多元传播”的融合媒体云平台设计思路,最终构成融合媒体云平台的业务流程。 展开更多
关键词 Springcloud框架 微服务架构 融合媒体 云平台
下载PDF
Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing
19
作者 Nader Abdel Karim Osama A.Khashan +4 位作者 Waleed K.Abdulraheem Moutaz Alazab Hasan Kanaker Mahmoud E.Farfoura Mohammad Alshinwan 《Computers, Materials & Continua》 SCIE EI 2024年第2期2023-2045,共23页
As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy i... As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment.A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware.The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment.An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance;Each hypervisor should be examined to meet specific needs.The main objective of this study is to provide accurate results to compare the performance of Hyper-V and Kernel-based Virtual Machine(KVM)while implementing different cryptographic algorithms to guide cloud service providers and end users in choosing the most suitable hypervisor for their cryptographic needs.This study evaluated the efficiency of two hypervisors,Hyper-V and KVM,in implementing six cryptographic algorithms:Rivest,Shamir,Adleman(RSA),Advanced Encryption Standard(AES),Triple Data Encryption Standard(TripleDES),Carlisle Adams and Stafford Tavares(CAST-128),BLOWFISH,and TwoFish.The study’s findings show that KVM outperforms Hyper-V,with 12.2%less Central Processing Unit(CPU)use and 12.95%less time overall for encryption and decryption operations with various file sizes.The study’s findings emphasize how crucial it is to pick a hypervisor that is appropriate for cryptographic needs in a cloud environment,which could assist both cloud service providers and end users.Future research may focus more on how various hypervisors perform while handling cryptographic workloads. 展开更多
关键词 cloud computing performance VIRTUALIZATION hypervisors HYPER-V KVM cryptographic algorithm
下载PDF
Evolutionary fingerprint, phylogenetic and forest structure of tropical montane Atlantic cloud forests along an elevation gradient
20
作者 Ravi Fernandes MARIANO Vanessa Leite REZENDE +7 位作者 Cléber Rodrigo de SOUZA Patrícia Vieira POMPEU Rubens Manoel dos SANTOS Carolina Njaime MENDES Aloysio Souza de MOURA Felipe Santana MACHADO Warley Augusto Caldas CARVALHO Marco Aurélio Leite FONTES 《Journal of Mountain Science》 SCIE CSCD 2024年第4期1259-1271,共13页
Environmental conditions can change markedly over geographical distances along elevation gradients,making them natural laboratories to study the processes that structure communities.This work aimed to assess the influ... Environmental conditions can change markedly over geographical distances along elevation gradients,making them natural laboratories to study the processes that structure communities.This work aimed to assess the influences of elevation on Tropical Montane Cloud Forest plant communities in the Brazilian Atlantic Forest,a historically neglected ecoregion.We evaluated the phylogenetic structure,forest structure(tree basal area and tree density)and species richness along an elevation gradient,as well as the evolutionary fingerprints of elevation-success on phylogenetic lineages from the tree communities.To do so,we assessed nine communities along an elevation gradient from 1210 to 2310 m a.s.l.without large elevation gaps.The relationships between elevation and phylogenetic structure,forest structure and species richness were investigated through Linear Models.The occurrence of evolutionary fingerprint on phylogenetic lineages was investigated by quantifying the extent of phylogenetic signal of elevation-success using a genus-level molecular phylogeny.Our results showed decreased species richness at higher elevations and independence between forest structure,phylogenetic structure and elevation.We also verified that there is a phylogenetic signal associated with elevation-success by lineages.We concluded that the elevation is associated with species richness and the occurrence of phylogenetic lineages in the tree communities evaluated in Mantiqueira Range.On the other hand,elevation is not associated with forest structure or phylogenetic structure.Furthermore,closely related taxa tend to have their higher ecological success in similar elevations.Finally,we highlight the fragility of the tropical montane cloud forests in the Mantiqueira Range in face of environmental changes(i.e.global warming)due to the occurrence of exclusive phylogenetic lineages evolutionarily adapted to environmental conditions(i.e.minimum temperature)associated with each elevation range. 展开更多
关键词 Atlantic Forest cloud forest CONSERVATION Community ecology Montane forests Phylogenetic diversity Phylogenetic signal
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部