In vehicular fog computing(VFC),the resource transactions in the Internet of Vehicles(IoV)have become a novel resource management scheme that can improve system resource utilization and the quality of vehicle services...In vehicular fog computing(VFC),the resource transactions in the Internet of Vehicles(IoV)have become a novel resource management scheme that can improve system resource utilization and the quality of vehicle services.In this paper,in order to improve the security and fairness of resource transactions,we design a blockchain-based resource management scheme for VFC.First,we propose the concept of resource coin(RC)and develop a blockchain-based secure computing reource trading mechanism in terms of RC.As a node of the blockchain network,the roadside unit(RSU)participates in verifying the legitimacy of transactions and the creation of new blocks.Next,we propose a resource management scheme based on contract theory,encouraging parked vehicles to contribute computing resource so that RSU could complete proof of work(PoW)quickly,improve the success probability of block creation and get RC rewards.We use the gradient descent method to solve the computing resource utilization that can maximize the RC revenue of RSUs and vehicles during the block creation.Finally,the performance of this model is validated in simulation result and analysis.展开更多
Dispersed computing can link all devices with computing capabilities on a global scale to form a fully decentralized network,which can make full use of idle computing resources.Realizing the overall resource allocatio...Dispersed computing can link all devices with computing capabilities on a global scale to form a fully decentralized network,which can make full use of idle computing resources.Realizing the overall resource allocation of the dispersed computing system is a significant challenge.In detail,by jointly managing the task requests of external users and the resource allocation of the internal system to achieve dynamic balance,the efficient and stable operation of the system can be guaranteed.In this paper,we first propose a task-resource joint management model,which quantifies the dynamic transformation relationship between the resources consumed by task requests and the resources occupied by the system in dispersed computing.Secondly,to avoid downtime caused by an overload of resources,we introduce intelligent control into the task-resource joint management model.The existence and stability of the positive periodic solution of the model can be obtained by theoretical analysis,which means that the stable operation of dispersed computing can be guaranteed through the intelligent feedback control strategy.Additionally,to improve the system utilization,the task-resource joint management model with bi-directional intelligent control is further explored.Setting control thresholds for the two resources not only reverse restrains the system resource overload,but also carries out positive incentive control when a large number of idle resources appear.The existence and stability of the positive periodic solution of the model are proved theoretically,that is,the model effectively avoids the two extreme cases and ensure the efficient and stable operation of the system.Finally,numerical simulation verifies the correctness and validity of the theoretical results.展开更多
In recent years,vehicular cloud computing(VCC)has gained vast attention for providing a variety of services by creating virtual machines(VMs).These VMs use the resources that are present in modern smart vehicles.Many ...In recent years,vehicular cloud computing(VCC)has gained vast attention for providing a variety of services by creating virtual machines(VMs).These VMs use the resources that are present in modern smart vehicles.Many studies reported that some of these VMs hosted on the vehicles are overloaded,whereas others are underloaded.As a circumstance,the energy consumption of overloaded vehicles is drastically increased.On the other hand,underloaded vehicles are also drawing considerable energy in the underutilized situation.Therefore,minimizing the energy consumption of the VMs that are hosted by both overloaded and underloaded is a challenging issue in the VCC environment.The proper and efcient utilization of the vehicle’s resources can reduce energy consumption signicantly.One of the solutions is to improve the resource utilization of underloaded vehicles by migrating the over-utilized VMs of overloaded vehicles.On the other hand,a large number of VM migrations can lead to wastage of energy and time,which ultimately degrades the performance of the VMs.This paper addresses the issues mentioned above by introducing a resource management algorithm,called resource utilization-aware VM migration(RU-VMM)algorithm,to distribute the loads among the overloaded and underloaded vehicles,such that energy consumption is minimized.RU-VMM monitors the trend of resource utilization to select the source and destination vehicles within a predetermined threshold for the process of VM migration.It ensures that any vehicles’resource utilization should not exceed the threshold before or after the migration.RU-VMM also tries to avoid unnecessary VM migrations between the vehicles.RU-VMM is extensively simulated and tested using nine datasets.The results are carried out using three performance metrics,namely number of nal source vehicles(nfsv),percentage of successful VM migrations(psvmm)and percentage of dropped VM migrations(pdvmm),and compared with threshold-based algorithm(i.e.,threshold)and cumulative sum(CUSUM)algorithm.The comparisons show that the RU-VMM algorithm performs better than the existing algorithms.RU-VMM algorithm improves 16.91%than the CUSUM algorithm and 71.59%than the threshold algorithm in terms of nfsv,and 20.62%and 275.34%than the CUSUM and threshold algorithms in terms of psvmm.展开更多
In a cloud environment, Virtual Machines (VMs) consolidation andresource provisioning are used to address the issues of workload fluctuations.VM consolidation aims to move the VMs from one host to another in order tor...In a cloud environment, Virtual Machines (VMs) consolidation andresource provisioning are used to address the issues of workload fluctuations.VM consolidation aims to move the VMs from one host to another in order toreduce the number of active hosts and save power. Whereas resource provisioningattempts to provide additional resource capacity to the VMs as needed in order tomeet Quality of Service (QoS) requirements. However, these techniques have aset of limitations in terms of the additional costs related to migration and scalingtime, and energy overhead that need further consideration. Therefore, this paperpresents a comprehensive literature review on the subject of dynamic resourcemanagement (i.e., VMs consolidation and resource provisioning) in cloud computing environments, along with an overall discussion of the closely relatedworks. The outcomes of this research can be used to enhance the developmentof predictive resource management techniques, by considering the awareness ofperformance variation, energy consumption and cost to efficiently manage thecloud resources.展开更多
Edge computing is a cloud computing extension where physical compu-ters are installed closer to the device to minimize latency.The task of edge data cen-ters is to include a growing abundance of applications with a sm...Edge computing is a cloud computing extension where physical compu-ters are installed closer to the device to minimize latency.The task of edge data cen-ters is to include a growing abundance of applications with a small capability in comparison to conventional data centers.Under this framework,Federated Learning was suggested to offer distributed data training strategies by the coordination of many mobile devices for the training of a popular Artificial Intelligence(AI)model without actually revealing the underlying data,which is significantly enhanced in terms of privacy.Federated learning(FL)is a recently developed decentralized profound learning methodology,where customers train their localized neural network models independently using private data,and then combine a global model on the core server together.The models on the edge server use very little time since the edge server is highly calculated.But the amount of time it takes to download data from smartphone users on the edge server has a significant impact on the time it takes to complete a single cycle of FL operations.A machine learning strategic planning system that uses FL in conjunction to minimise model training time and total time utilisation,while recognising mobile appliance energy restrictions,is the focus of this study.To further speed up integration and reduce the amount of data,it implements an optimization agent for the establishment of optimal aggregation policy and asylum architecture with several employees’shared learners.The main solutions and lessons learnt along with the prospects are discussed.Experiments show that our method is superior in terms of the effective and elastic use of resources.展开更多
In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of sate...In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of satellites necessitate the use of edge computing to enhance secure communication.While edge computing reduces the burden on cloud computing, it introduces security and reliability challenges in open satellite communication channels. To address these challenges, we propose a blockchain architecture specifically designed for edge computing in mega-constellation communication systems. This architecture narrows down the consensus scope of the blockchain to meet the requirements of edge computing while ensuring comprehensive log storage across the network. Additionally, we introduce a reputation management mechanism for nodes within the blockchain, evaluating their trustworthiness, workload, and efficiency. Nodes with higher reputation scores are selected to participate in tasks and are appropriately incentivized. Simulation results demonstrate that our approach achieves a task result reliability of 95% while improving computational speed.展开更多
The satellite-terrestrial networks possess the ability to transcend geographical constraints inherent in traditional communication networks,enabling global coverage and offering users ubiquitous computing power suppor...The satellite-terrestrial networks possess the ability to transcend geographical constraints inherent in traditional communication networks,enabling global coverage and offering users ubiquitous computing power support,which is an important development direction of future communications.In this paper,we take into account a multi-scenario network model under the coverage of low earth orbit(LEO)satellite,which can provide computing resources to users in faraway areas to improve task processing efficiency.However,LEO satellites experience limitations in computing and communication resources and the channels are time-varying and complex,which makes the extraction of state information a daunting task.Therefore,we explore the dynamic resource management issue pertaining to joint computing,communication resource allocation and power control for multi-access edge computing(MEC).In order to tackle this formidable issue,we undertake the task of transforming the issue into a Markov decision process(MDP)problem and propose the self-attention based dynamic resource management(SABDRM)algorithm,which effectively extracts state information features to enhance the training process.Simulation results show that the proposed algorithm is capable of effectively reducing the long-term average delay and energy consumption of the tasks.展开更多
Federated learning has been explored as a promising solution for training machine learning models at the network edge,without sharing private user data.With limited resources at the edge,new solutions must be develope...Federated learning has been explored as a promising solution for training machine learning models at the network edge,without sharing private user data.With limited resources at the edge,new solutions must be developed to leverage the software and hardware resources as the existing solutions did not focus on resource management for network edge,specially for federated learning.In this paper,we describe the recent work on resource manage-ment at the edge and explore the challenges and future directions to allow the execution of federated learning at the edge.Problems such as the discovery of resources,deployment,load balancing,migration,and energy effi-ciency are discussed in the paper.展开更多
Single-pixel imaging(SPI)enables an invisible target to be imaged onto a photosensitive surface without a lens,emerging as a promising way for indirect optical encryption.However,due to its linear and broadcast imagin...Single-pixel imaging(SPI)enables an invisible target to be imaged onto a photosensitive surface without a lens,emerging as a promising way for indirect optical encryption.However,due to its linear and broadcast imaging principles,SPI encryption has been confined to a single-user framework for the long term.We propose a multi-image SPI encryption method and combine it with orthogonal frequency division multiplexing-assisted key management,to achieve a multiuser SPI encryption and authentication framework.Multiple images are first encrypted as a composite intensity sequence containing the plaintexts and authentication information,simultaneously generating different sets of keys for users.Then,the SPI keys for encryption and authentication are asymmetrically isolated into independent frequency carriers and encapsulated into a Malus metasurface,so as to establish an individually private and content-independent channel for each user.Users can receive different plaintexts privately and verify the authenticity,eliminating the broadcast transparency of SPI encryption.The improved linear security is also verified by simulating attacks.By the combination of direct key management and indirect image encryption,our work achieves the encryption and authentication functionality under a multiuser computational imaging framework,facilitating its application in optical communication,imaging,and security.展开更多
With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dyn...With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dynamical, scalable and often virtuMized resources are provided as services. With virtualization technology, cloud computing offers diverse services (such as virtual computing, virtual storage, virtual bandwidth, etc.) for the public by means of multi-tenancy mode. Although users are enjoying the capabilities of super-computing and mass storage supplied by cloud computing, cloud security still remains as a hot spot problem, which is in essence the trust management between data owners and storage service providers. In this paper, we propose a data coloring method based on cloud watermarking to recognize and ensure mutual reputations. The experimental results show that the robustness of reverse cloud generator can guarantee users' embedded social reputation identifications. Hence, our work provides a reference solution to the critical problem of cloud security.展开更多
Mobility management is an essential component in enabling mobile hosts to move seamlessly from one location to another while maintaining the packet routing efficiency between the corresponding hosts. One of the concer...Mobility management is an essential component in enabling mobile hosts to move seamlessly from one location to another while maintaining the packet routing efficiency between the corresponding hosts. One of the concerns raised with the internet engineering task force(IETF)mobile IP standard is the excessive signaling generated for highly mobile computers. This paper introduces a scheme to address that issue by manipulating the inherent client-server interaction which exists in most applications to provide the correspondent host with the current mobile host binding. To evaluate the performance of the scheme, typical internet application sessions involving a mobile host is simulated and the signaling and routing costs are examined. Results show a substantial reduction in the mobility management overhead as well as the total cost of delivering packets to the mobile host.展开更多
Mountain areas are often rich in ecological diversity and recreational opportunities. Mountain tourism is thought to be an effective and important means for maintaining and expanding rural economies and, thus, improvi...Mountain areas are often rich in ecological diversity and recreational opportunities. Mountain tourism is thought to be an effective and important means for maintaining and expanding rural economies and, thus, improving the living conditions of rural societies. As mountain tourism service research is a professional field with several disciplines involved, a multi-disciplinary management pIatform is needed and it facilitates participation in sustainable mountain development by diverse stakeholders. With the source regions of the Yangtze and the Yellow River as a case study, this paper presents a conceptual framework for an adaptation management of mountain tourism services according to technical, policy, social and economic dimensions. The framework is based on a vulnerability assessment of mountain ecosystems, and can serve as a reference for the development of tourism service in other mountain areas.展开更多
Urbanization is the dominant form of land-use change in terms of impacts on water quality, hydrology, physical proper- ties of watersheds and their nonpoint source (NPS) pollution po- tential at present. Urbanization ...Urbanization is the dominant form of land-use change in terms of impacts on water quality, hydrology, physical proper- ties of watersheds and their nonpoint source (NPS) pollution po- tential at present. Urbanization has changed the source, process and sink of urban NPS pollution, especially raised the pollution load of urban runoff NPS in receiving water. Urban runoff pollu- tion is a hot spot of research on NPS. This paper analyzed type, source and harm of the NPS pollutants of urban runoff and its influence on the receiving water. Through estimating NPS pollu- tion load of urban runoff and summarizing the law and character- istics of urban runoff NPS systemically, study on management and control of urban runoff NPS pollution was focused on the applica- tion of BMPs (best management practices). It is a fresh method- ology that management and control on NPS pollution from urban surface runoff was analyzed by methods of landscape ecology, environmental economics and environmental management. The paper provided a scientific reference for mitigating urban water environment pressure and an effective method for management and control of NPS pollution from urban surface runoff..展开更多
In recent years,the significant growth in the Internet of Things(IoT)technology has brought a lot of attention to information and communication industry.Various IoT paradigms like the Internet of Vehicle Things(IoVT)a...In recent years,the significant growth in the Internet of Things(IoT)technology has brought a lot of attention to information and communication industry.Various IoT paradigms like the Internet of Vehicle Things(IoVT)and the Internet of Health Things(IoHT)create massive volumes of data every day which consume a lot of bandwidth and storage.However,to process such large volumes of data,the existing cloud computing platforms offer limited resources due to their distance from IoT devices.Consequently,cloudcomputing systems produce intolerable latency problems for latency-sensitive real-time applications.Therefore,a newparadigm called fog computingmakes use of computing nodes in the form of mobile devices,which utilize and process the real-time IoT devices data in orders of milliseconds.This paper proposes workload-aware efficient resource allocation and load balancing in the fog-computing environment for the IoHT.The proposed algorithmic framework consists of the following components:task sequencing,dynamic resource allocation,and load balancing.We consider electrocardiography(ECG)sensors for patient’s critical tasks to achieve maximum load balancing among fog nodes and to measure the performance of end-to-end delay,energy,network consumption and average throughput.The proposed algorithm has been evaluated using the iFogSim tool,and results with the existing approach have been conducted.The experimental results exhibit that the proposed technique achieves a 45%decrease in delay,37%reduction in energy consumption,and 25%decrease in network bandwidth consumption compared to the existing studies.展开更多
Recently,computation offloading has become an effective method for overcoming the constraint of a mobile device(MD)using computationintensivemobile and offloading delay-sensitive application tasks to the remote cloud-...Recently,computation offloading has become an effective method for overcoming the constraint of a mobile device(MD)using computationintensivemobile and offloading delay-sensitive application tasks to the remote cloud-based data center.Smart city benefitted from offloading to edge point.Consider a mobile edge computing(MEC)network in multiple regions.They comprise N MDs and many access points,in which everyMDhasM independent real-time tasks.This study designs a new Task Offloading and Resource Allocation in IoT-based MEC using Deep Learning with Seagull Optimization(TORA-DLSGO)algorithm.The proposed TORA-DLSGO technique addresses the resource management issue in the MEC server,which enables an optimum offloading decision to minimize the system cost.In addition,an objective function is derived based on minimizing energy consumption subject to the latency requirements and restricted resources.The TORA-DLSGO technique uses the deep belief network(DBN)model for optimum offloading decision-making.Finally,the SGO algorithm is used for the parameter tuning of the DBN model.The simulation results exemplify that the TORA-DLSGO technique outperformed the existing model in reducing client overhead in the MEC systems with a maximum reward of 0.8967.展开更多
Grid technique is taken as the third generation internet technology and resource management is the core of it. Aiming at the problems of resource management of CEDAGrid (China Earthquake Disaster Alleviation and Simu...Grid technique is taken as the third generation internet technology and resource management is the core of it. Aiming at the problems of resource management of CEDAGrid (China Earthquake Disaster Alleviation and Simulation Grid) in its preliminary construction, this paper presents a resource management and job scheduling model: ProRMJS to solve these problems. For platform supposed agreeably each computing node can provide computation service, ProRMJS uses "computation pool" to support scheduler, and then the scheduler allocates jobs dynamically according to computing capability and status of each node to ensure the stability of the platform. At the same time, ProRMJS monitors the status of job on each node and sets a time threshold to manage the job scheduling. By estimating the computing capability of each node, ProRMJS allocates jobs on demand to solve the problem of supposing each node can finish the job acquiescently. When calculating the computing capability of each node, ProRMJS allows for the various factors that affect the computing capability and then the efficiency of the platform is improved. Finally the validity of the model is verified by an example.展开更多
In P2P Grid computing systems, the authorization decision is often tackled by two different trust management methods: policy-based approach, where authorization are built on logical rules and verifiable properties en...In P2P Grid computing systems, the authorization decision is often tackled by two different trust management methods: policy-based approach, where authorization are built on logical rules and verifiable properties encoded in signed credentials, and reputation-based approach, based on collecting, aggregating and disseminating reputation among the peers. However, the overhead caused by proof of compliance on authorization and the absence of certifying authorities may negate the strong and objective security advantages of policy-based approach, whilst vagueness, complexity and inaccurate characterization caused by reputation evolution may eliminate the quantitative and flexible advantages of reputation-based approach. We propose an adaptive trust management framework, which combines the merit of policy proof and reputation evolution such that authorization is aware of not only the strong and objective security traits, but also the calculability and the availability security traits. Finally, the framework of system is proposed.展开更多
his paper examines planning management problems in a Multiagentbased Distributed Open Computing Environment Model (MDOCEM). First the meaning of planning management in MDOCEM is introduced, and then a formal method to...his paper examines planning management problems in a Multiagentbased Distributed Open Computing Environment Model (MDOCEM). First the meaning of planning management in MDOCEM is introduced, and then a formal method to describe the associated task partition problems is presented, and a heuristic algorithm which gives an approximate optimum solution is given. Finally the task coordination and integration of execution results are discussed.展开更多
Cloud computing paradigm is a service oriented system that delivers services to the customer at low cost. Cloud computing needs to address three main security issues: confidentiality, integrity and availability. In th...Cloud computing paradigm is a service oriented system that delivers services to the customer at low cost. Cloud computing needs to address three main security issues: confidentiality, integrity and availability. In this paper, we propose user identity management protocol for cloud computing customers and cloud service providers. This protocol will authenticate and authorize customers/providers in other to achieve global security networks. The protocol will be developed to achieve the set global security objectives in cloud computing environments. Confidentiality, integrity and availability are the key challenges of web services’ or utility providers. A layered protocol design is proposed for cloud computing systems, the physical, networks and application layer. However, each layer will integrate existing security features such as firewalls, NIDS, NIPS, Anti-DDOS and others to prevent security threats and attacks. System vulnerability is critical to the cloud computing facilities;the proposed protocol will address this as part of measures to secure data at all levels. The protocol will protect customers/cloud service providers’ infrastructure by preventing unauthorized users to gain access to the service/facility.展开更多
Based on the integration of C#.net and SuperMap Objects(tool software of component GIS),the management system of regional pollution source is developed.It mainly includes the demand analysis of system,function design,...Based on the integration of C#.net and SuperMap Objects(tool software of component GIS),the management system of regional pollution source is developed.It mainly includes the demand analysis of system,function design,database construction,program design and concrete realization in the management aspect of pollution source.展开更多
基金This work was supported in part by the National Natural Science Foundation of China(U2001213,61971191 and 61661021)in part by the Beijing Natural Science Foundation under Grant L182018 and L201011,in part by National Key Research and Development Project(2020YFB1807204)+1 种基金in part by the open project of Shanghai Institute of Microsystem and Information Technology(20190910)in part by the Key project of Natural Science Foundation of Jiangxi Province(20202ACBL202006).
文摘In vehicular fog computing(VFC),the resource transactions in the Internet of Vehicles(IoV)have become a novel resource management scheme that can improve system resource utilization and the quality of vehicle services.In this paper,in order to improve the security and fairness of resource transactions,we design a blockchain-based resource management scheme for VFC.First,we propose the concept of resource coin(RC)and develop a blockchain-based secure computing reource trading mechanism in terms of RC.As a node of the blockchain network,the roadside unit(RSU)participates in verifying the legitimacy of transactions and the creation of new blocks.Next,we propose a resource management scheme based on contract theory,encouraging parked vehicles to contribute computing resource so that RSU could complete proof of work(PoW)quickly,improve the success probability of block creation and get RC rewards.We use the gradient descent method to solve the computing resource utilization that can maximize the RC revenue of RSUs and vehicles during the block creation.Finally,the performance of this model is validated in simulation result and analysis.
基金supported in part by the National Science Foundation Project of P.R.China(No.61931001)the Scientific and Technological Innovation Foundation of Foshan,USTB(No.BK20AF003)。
文摘Dispersed computing can link all devices with computing capabilities on a global scale to form a fully decentralized network,which can make full use of idle computing resources.Realizing the overall resource allocation of the dispersed computing system is a significant challenge.In detail,by jointly managing the task requests of external users and the resource allocation of the internal system to achieve dynamic balance,the efficient and stable operation of the system can be guaranteed.In this paper,we first propose a task-resource joint management model,which quantifies the dynamic transformation relationship between the resources consumed by task requests and the resources occupied by the system in dispersed computing.Secondly,to avoid downtime caused by an overload of resources,we introduce intelligent control into the task-resource joint management model.The existence and stability of the positive periodic solution of the model can be obtained by theoretical analysis,which means that the stable operation of dispersed computing can be guaranteed through the intelligent feedback control strategy.Additionally,to improve the system utilization,the task-resource joint management model with bi-directional intelligent control is further explored.Setting control thresholds for the two resources not only reverse restrains the system resource overload,but also carries out positive incentive control when a large number of idle resources appear.The existence and stability of the positive periodic solution of the model are proved theoretically,that is,the model effectively avoids the two extreme cases and ensure the efficient and stable operation of the system.Finally,numerical simulation verifies the correctness and validity of the theoretical results.
文摘In recent years,vehicular cloud computing(VCC)has gained vast attention for providing a variety of services by creating virtual machines(VMs).These VMs use the resources that are present in modern smart vehicles.Many studies reported that some of these VMs hosted on the vehicles are overloaded,whereas others are underloaded.As a circumstance,the energy consumption of overloaded vehicles is drastically increased.On the other hand,underloaded vehicles are also drawing considerable energy in the underutilized situation.Therefore,minimizing the energy consumption of the VMs that are hosted by both overloaded and underloaded is a challenging issue in the VCC environment.The proper and efcient utilization of the vehicle’s resources can reduce energy consumption signicantly.One of the solutions is to improve the resource utilization of underloaded vehicles by migrating the over-utilized VMs of overloaded vehicles.On the other hand,a large number of VM migrations can lead to wastage of energy and time,which ultimately degrades the performance of the VMs.This paper addresses the issues mentioned above by introducing a resource management algorithm,called resource utilization-aware VM migration(RU-VMM)algorithm,to distribute the loads among the overloaded and underloaded vehicles,such that energy consumption is minimized.RU-VMM monitors the trend of resource utilization to select the source and destination vehicles within a predetermined threshold for the process of VM migration.It ensures that any vehicles’resource utilization should not exceed the threshold before or after the migration.RU-VMM also tries to avoid unnecessary VM migrations between the vehicles.RU-VMM is extensively simulated and tested using nine datasets.The results are carried out using three performance metrics,namely number of nal source vehicles(nfsv),percentage of successful VM migrations(psvmm)and percentage of dropped VM migrations(pdvmm),and compared with threshold-based algorithm(i.e.,threshold)and cumulative sum(CUSUM)algorithm.The comparisons show that the RU-VMM algorithm performs better than the existing algorithms.RU-VMM algorithm improves 16.91%than the CUSUM algorithm and 71.59%than the threshold algorithm in terms of nfsv,and 20.62%and 275.34%than the CUSUM and threshold algorithms in terms of psvmm.
文摘In a cloud environment, Virtual Machines (VMs) consolidation andresource provisioning are used to address the issues of workload fluctuations.VM consolidation aims to move the VMs from one host to another in order toreduce the number of active hosts and save power. Whereas resource provisioningattempts to provide additional resource capacity to the VMs as needed in order tomeet Quality of Service (QoS) requirements. However, these techniques have aset of limitations in terms of the additional costs related to migration and scalingtime, and energy overhead that need further consideration. Therefore, this paperpresents a comprehensive literature review on the subject of dynamic resourcemanagement (i.e., VMs consolidation and resource provisioning) in cloud computing environments, along with an overall discussion of the closely relatedworks. The outcomes of this research can be used to enhance the developmentof predictive resource management techniques, by considering the awareness ofperformance variation, energy consumption and cost to efficiently manage thecloud resources.
文摘Edge computing is a cloud computing extension where physical compu-ters are installed closer to the device to minimize latency.The task of edge data cen-ters is to include a growing abundance of applications with a small capability in comparison to conventional data centers.Under this framework,Federated Learning was suggested to offer distributed data training strategies by the coordination of many mobile devices for the training of a popular Artificial Intelligence(AI)model without actually revealing the underlying data,which is significantly enhanced in terms of privacy.Federated learning(FL)is a recently developed decentralized profound learning methodology,where customers train their localized neural network models independently using private data,and then combine a global model on the core server together.The models on the edge server use very little time since the edge server is highly calculated.But the amount of time it takes to download data from smartphone users on the edge server has a significant impact on the time it takes to complete a single cycle of FL operations.A machine learning strategic planning system that uses FL in conjunction to minimise model training time and total time utilisation,while recognising mobile appliance energy restrictions,is the focus of this study.To further speed up integration and reduce the amount of data,it implements an optimization agent for the establishment of optimal aggregation policy and asylum architecture with several employees’shared learners.The main solutions and lessons learnt along with the prospects are discussed.Experiments show that our method is superior in terms of the effective and elastic use of resources.
基金supported in part by the National Natural Science Foundation of China under Grant No.U2268204,62172061 and 61871422National Key R&D Program of China under Grant No.2020YFB1711800 and 2020YFB1707900+2 种基金the Science and Technology Project of Sichuan Province under Grant No.2023ZHCG0014,2023ZHCG0011,2022YFG0155,2022YFG0157,2021GFW019,2021YFG0152,2021YFG0025,2020YFG0322Central Universities of Southwest Minzu University under Grant No.ZYN2022032,2023NYXXS034the State Scholarship Fund of the China Scholarship Council under Grant No.202008510081。
文摘In mega-constellation Communication Systems, efficient routing algorithms and data transmission technologies are employed to ensure fast and reliable data transfer. However, the limited computational resources of satellites necessitate the use of edge computing to enhance secure communication.While edge computing reduces the burden on cloud computing, it introduces security and reliability challenges in open satellite communication channels. To address these challenges, we propose a blockchain architecture specifically designed for edge computing in mega-constellation communication systems. This architecture narrows down the consensus scope of the blockchain to meet the requirements of edge computing while ensuring comprehensive log storage across the network. Additionally, we introduce a reputation management mechanism for nodes within the blockchain, evaluating their trustworthiness, workload, and efficiency. Nodes with higher reputation scores are selected to participate in tasks and are appropriately incentivized. Simulation results demonstrate that our approach achieves a task result reliability of 95% while improving computational speed.
基金supported by the National Key Research and Development Plan(No.2022YFB2902701)the key Natural Science Foundation of Shenzhen(No.JCYJ20220818102209020).
文摘The satellite-terrestrial networks possess the ability to transcend geographical constraints inherent in traditional communication networks,enabling global coverage and offering users ubiquitous computing power support,which is an important development direction of future communications.In this paper,we take into account a multi-scenario network model under the coverage of low earth orbit(LEO)satellite,which can provide computing resources to users in faraway areas to improve task processing efficiency.However,LEO satellites experience limitations in computing and communication resources and the channels are time-varying and complex,which makes the extraction of state information a daunting task.Therefore,we explore the dynamic resource management issue pertaining to joint computing,communication resource allocation and power control for multi-access edge computing(MEC).In order to tackle this formidable issue,we undertake the task of transforming the issue into a Markov decision process(MDP)problem and propose the self-attention based dynamic resource management(SABDRM)algorithm,which effectively extracts state information features to enhance the training process.Simulation results show that the proposed algorithm is capable of effectively reducing the long-term average delay and energy consumption of the tasks.
基金supported by CAPES,CNPq,and grant 15/24494-8,Sao Paulo Research Foundation(FAPESP).
文摘Federated learning has been explored as a promising solution for training machine learning models at the network edge,without sharing private user data.With limited resources at the edge,new solutions must be developed to leverage the software and hardware resources as the existing solutions did not focus on resource management for network edge,specially for federated learning.In this paper,we describe the recent work on resource manage-ment at the edge and explore the challenges and future directions to allow the execution of federated learning at the edge.Problems such as the discovery of resources,deployment,load balancing,migration,and energy effi-ciency are discussed in the paper.
基金supported by the National Key R&D Program of China(Grant No.2021YFB3900300)National Natural Science Foundation of China(Grant Nos.61860206007,62275177,and 62371321)+4 种基金Ministry of Education Science and Technology Chunhui Project(Grant No.HZKY20220559)International S and T Cooperation Program of Sichuan Province(Grant No.2023YFH0030)Sichuan Science and Technology Innovation Seeding Project(Grant No.23-YCG034)Sichuan Science and Technology Program(Grant No.2023YFG0334)Chengdu Science and Technology Program(Grant No.2022-GH02-00001-HZ).
文摘Single-pixel imaging(SPI)enables an invisible target to be imaged onto a photosensitive surface without a lens,emerging as a promising way for indirect optical encryption.However,due to its linear and broadcast imaging principles,SPI encryption has been confined to a single-user framework for the long term.We propose a multi-image SPI encryption method and combine it with orthogonal frequency division multiplexing-assisted key management,to achieve a multiuser SPI encryption and authentication framework.Multiple images are first encrypted as a composite intensity sequence containing the plaintexts and authentication information,simultaneously generating different sets of keys for users.Then,the SPI keys for encryption and authentication are asymmetrically isolated into independent frequency carriers and encapsulated into a Malus metasurface,so as to establish an individually private and content-independent channel for each user.Users can receive different plaintexts privately and verify the authenticity,eliminating the broadcast transparency of SPI encryption.The improved linear security is also verified by simulating attacks.By the combination of direct key management and indirect image encryption,our work achieves the encryption and authentication functionality under a multiuser computational imaging framework,facilitating its application in optical communication,imaging,and security.
基金supported by National Basic Research Program of China (973 Program) (No. 2007CB310800)China Postdoctoral Science Foundation (No. 20090460107 and No. 201003794)
文摘With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dynamical, scalable and often virtuMized resources are provided as services. With virtualization technology, cloud computing offers diverse services (such as virtual computing, virtual storage, virtual bandwidth, etc.) for the public by means of multi-tenancy mode. Although users are enjoying the capabilities of super-computing and mass storage supplied by cloud computing, cloud security still remains as a hot spot problem, which is in essence the trust management between data owners and storage service providers. In this paper, we propose a data coloring method based on cloud watermarking to recognize and ensure mutual reputations. The experimental results show that the robustness of reverse cloud generator can guarantee users' embedded social reputation identifications. Hence, our work provides a reference solution to the critical problem of cloud security.
文摘Mobility management is an essential component in enabling mobile hosts to move seamlessly from one location to another while maintaining the packet routing efficiency between the corresponding hosts. One of the concerns raised with the internet engineering task force(IETF)mobile IP standard is the excessive signaling generated for highly mobile computers. This paper introduces a scheme to address that issue by manipulating the inherent client-server interaction which exists in most applications to provide the correspondent host with the current mobile host binding. To evaluate the performance of the scheme, typical internet application sessions involving a mobile host is simulated and the signaling and routing costs are examined. Results show a substantial reduction in the mobility management overhead as well as the total cost of delivering packets to the mobile host.
基金supported by the grant from the National Basic Research Program of China (973 Program, No. 2007CB411507)Open Fund from the State Key Laboratory of Cryosphere Science (SKLCS 08-05)
文摘Mountain areas are often rich in ecological diversity and recreational opportunities. Mountain tourism is thought to be an effective and important means for maintaining and expanding rural economies and, thus, improving the living conditions of rural societies. As mountain tourism service research is a professional field with several disciplines involved, a multi-disciplinary management pIatform is needed and it facilitates participation in sustainable mountain development by diverse stakeholders. With the source regions of the Yangtze and the Yellow River as a case study, this paper presents a conceptual framework for an adaptation management of mountain tourism services according to technical, policy, social and economic dimensions. The framework is based on a vulnerability assessment of mountain ecosystems, and can serve as a reference for the development of tourism service in other mountain areas.
基金Key Program of Natural Science Foundation of China(No. 40576024).
文摘Urbanization is the dominant form of land-use change in terms of impacts on water quality, hydrology, physical proper- ties of watersheds and their nonpoint source (NPS) pollution po- tential at present. Urbanization has changed the source, process and sink of urban NPS pollution, especially raised the pollution load of urban runoff NPS in receiving water. Urban runoff pollu- tion is a hot spot of research on NPS. This paper analyzed type, source and harm of the NPS pollutants of urban runoff and its influence on the receiving water. Through estimating NPS pollu- tion load of urban runoff and summarizing the law and character- istics of urban runoff NPS systemically, study on management and control of urban runoff NPS pollution was focused on the applica- tion of BMPs (best management practices). It is a fresh method- ology that management and control on NPS pollution from urban surface runoff was analyzed by methods of landscape ecology, environmental economics and environmental management. The paper provided a scientific reference for mitigating urban water environment pressure and an effective method for management and control of NPS pollution from urban surface runoff..
基金This research is supported and funded by King Khalid University of Saudi Arabia under the Grant Number R.G.P.1/365/42。
文摘In recent years,the significant growth in the Internet of Things(IoT)technology has brought a lot of attention to information and communication industry.Various IoT paradigms like the Internet of Vehicle Things(IoVT)and the Internet of Health Things(IoHT)create massive volumes of data every day which consume a lot of bandwidth and storage.However,to process such large volumes of data,the existing cloud computing platforms offer limited resources due to their distance from IoT devices.Consequently,cloudcomputing systems produce intolerable latency problems for latency-sensitive real-time applications.Therefore,a newparadigm called fog computingmakes use of computing nodes in the form of mobile devices,which utilize and process the real-time IoT devices data in orders of milliseconds.This paper proposes workload-aware efficient resource allocation and load balancing in the fog-computing environment for the IoHT.The proposed algorithmic framework consists of the following components:task sequencing,dynamic resource allocation,and load balancing.We consider electrocardiography(ECG)sensors for patient’s critical tasks to achieve maximum load balancing among fog nodes and to measure the performance of end-to-end delay,energy,network consumption and average throughput.The proposed algorithm has been evaluated using the iFogSim tool,and results with the existing approach have been conducted.The experimental results exhibit that the proposed technique achieves a 45%decrease in delay,37%reduction in energy consumption,and 25%decrease in network bandwidth consumption compared to the existing studies.
基金supported by the Technology Development Program of MSS(No.S3033853).
文摘Recently,computation offloading has become an effective method for overcoming the constraint of a mobile device(MD)using computationintensivemobile and offloading delay-sensitive application tasks to the remote cloud-based data center.Smart city benefitted from offloading to edge point.Consider a mobile edge computing(MEC)network in multiple regions.They comprise N MDs and many access points,in which everyMDhasM independent real-time tasks.This study designs a new Task Offloading and Resource Allocation in IoT-based MEC using Deep Learning with Seagull Optimization(TORA-DLSGO)algorithm.The proposed TORA-DLSGO technique addresses the resource management issue in the MEC server,which enables an optimum offloading decision to minimize the system cost.In addition,an objective function is derived based on minimizing energy consumption subject to the latency requirements and restricted resources.The TORA-DLSGO technique uses the deep belief network(DBN)model for optimum offloading decision-making.Finally,the SGO algorithm is used for the parameter tuning of the DBN model.The simulation results exemplify that the TORA-DLSGO technique outperformed the existing model in reducing client overhead in the MEC systems with a maximum reward of 0.8967.
基金Project "Seismic Data Share" from Ministry of Science and Technology of China.
文摘Grid technique is taken as the third generation internet technology and resource management is the core of it. Aiming at the problems of resource management of CEDAGrid (China Earthquake Disaster Alleviation and Simulation Grid) in its preliminary construction, this paper presents a resource management and job scheduling model: ProRMJS to solve these problems. For platform supposed agreeably each computing node can provide computation service, ProRMJS uses "computation pool" to support scheduler, and then the scheduler allocates jobs dynamically according to computing capability and status of each node to ensure the stability of the platform. At the same time, ProRMJS monitors the status of job on each node and sets a time threshold to manage the job scheduling. By estimating the computing capability of each node, ProRMJS allocates jobs on demand to solve the problem of supposing each node can finish the job acquiescently. When calculating the computing capability of each node, ProRMJS allows for the various factors that affect the computing capability and then the efficiency of the platform is improved. Finally the validity of the model is verified by an example.
基金Supported by the Open Research Foundation of National Key Laboratory (SKLSE04-018)National Social Science Foundation of China (06BTQ024)the Science and Technical Key Project of Hubei Province (2005AA101C43)
文摘In P2P Grid computing systems, the authorization decision is often tackled by two different trust management methods: policy-based approach, where authorization are built on logical rules and verifiable properties encoded in signed credentials, and reputation-based approach, based on collecting, aggregating and disseminating reputation among the peers. However, the overhead caused by proof of compliance on authorization and the absence of certifying authorities may negate the strong and objective security advantages of policy-based approach, whilst vagueness, complexity and inaccurate characterization caused by reputation evolution may eliminate the quantitative and flexible advantages of reputation-based approach. We propose an adaptive trust management framework, which combines the merit of policy proof and reputation evolution such that authorization is aware of not only the strong and objective security traits, but also the calculability and the availability security traits. Finally, the framework of system is proposed.
文摘his paper examines planning management problems in a Multiagentbased Distributed Open Computing Environment Model (MDOCEM). First the meaning of planning management in MDOCEM is introduced, and then a formal method to describe the associated task partition problems is presented, and a heuristic algorithm which gives an approximate optimum solution is given. Finally the task coordination and integration of execution results are discussed.
文摘Cloud computing paradigm is a service oriented system that delivers services to the customer at low cost. Cloud computing needs to address three main security issues: confidentiality, integrity and availability. In this paper, we propose user identity management protocol for cloud computing customers and cloud service providers. This protocol will authenticate and authorize customers/providers in other to achieve global security networks. The protocol will be developed to achieve the set global security objectives in cloud computing environments. Confidentiality, integrity and availability are the key challenges of web services’ or utility providers. A layered protocol design is proposed for cloud computing systems, the physical, networks and application layer. However, each layer will integrate existing security features such as firewalls, NIDS, NIPS, Anti-DDOS and others to prevent security threats and attacks. System vulnerability is critical to the cloud computing facilities;the proposed protocol will address this as part of measures to secure data at all levels. The protocol will protect customers/cloud service providers’ infrastructure by preventing unauthorized users to gain access to the service/facility.
文摘Based on the integration of C#.net and SuperMap Objects(tool software of component GIS),the management system of regional pollution source is developed.It mainly includes the demand analysis of system,function design,database construction,program design and concrete realization in the management aspect of pollution source.