The increasing trend toward dematerialization and digitalization has prompted a surge in the adoption of IT service providers, offering cost-effective alternatives to traditional local services. Consequently, cloud se...The increasing trend toward dematerialization and digitalization has prompted a surge in the adoption of IT service providers, offering cost-effective alternatives to traditional local services. Consequently, cloud services have become prevalent across various industries. While these services offer undeniable benefits, they face significant threats, particularly concerning the sensitivity of the data they handle. Many existing mathematical models struggle to accurately depict the complex scenarios of cloud systems. In response to this challenge, this paper proposes a behavioral model for ransomware propagation within such environments. In this model, each component of the environment is defined as an agent responsible for monitoring the propagation of malware. Given the distinct characteristics and criticality of these agents, the impact of malware can vary significantly. Scenario attacks are constructed based on real-world vulnerabilities documented in the Common Vulnerabilities and Exposures (CVEs) through the National Vulnerability Database. Defender actions are guided by an Intrusion Detection System (IDS) guideline. This research aims to provide a comprehensive framework for understanding and addressing ransomware threats in cloud systems. By leveraging an agent- based approach and real-world vulnerability data, our model offers valuable insights into detection and mitigation strategies for safeguarding sensitive cloud-based assets.展开更多
Cloud computing has become one of the most projecting words in the IT world due to its design for providing computing service as a utility. The typical use of cloud computing as a resource has changed the scenery of c...Cloud computing has become one of the most projecting words in the IT world due to its design for providing computing service as a utility. The typical use of cloud computing as a resource has changed the scenery of computing. Due to the increased flexibility, better reliability, great scalability, and decreased costs have captivated businesses and individuals alike because of the pay-per-use form of the cloud environment. Cloud computing is a completely internet dependent technology where client data are stored and maintained in the data center of a cloud provider like Google, Amazon, Apple Inc., Microsoft etc. The Anomaly Detection System is one of the Intrusion Detection techniques. It’s an area in the cloud environment that is been developed in the detection of unusual activities in the cloud networks. Although, there are a variety of Intrusion Detection techniques available in the cloud environment, this review paper exposes and focuses on different IDS in cloud networks through different categorizations and conducts comparative study on the security measures of Dropbox, Google Drive and iCloud, to illuminate their strength and weakness in terms of security.展开更多
The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many d...The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many different locations and interconnected by high speed networks. CDS, like any other emerging technology, is experiencing growing pains. It is immature, it is fragmented and it lacks standardization. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this paper a comprehensive security framework based on Multi-Agent System (MAS) architecture for CDS to facilitate confidentiality, correctness assurance, availability and integrity of users' data in the cloud is proposed. Our security framework consists of two main layers as agent layer and CDS layer. Our propose MAS architecture includes main five types of agents: Cloud Service Provider Agent (CSPA), Cloud Data Confidentiality Agent (CDConA), Cloud Data Correctness Agent (CDCorA), Cloud Data Availability Agent (CDAA) and Cloud Data Integrity Agent (CDIA). In order to verify our proposed security framework based on MAS architecture, pilot study is conducted using a questionnaire survey. Rasch Methodology is used to analyze the pilot data. Item reliability is found to be poor and a few respondents and items are identified as misfits with distorted measurements. As a result, some problematic questions are revised and some predictably easy questions are excluded from the questionnaire. A prototype of the system is implemented using Java. To simulate the agents, oracle database packages and triggers are used to implement agent functions and oracle jobs are utilized to create agents.展开更多
Concave clouds will cause miscalculation by the power prediction model based on cloud ieatures for distributed photovoltaic (PV) plant. The algorithm for decomposing concave cloud into convex images is proposed. Ado...Concave clouds will cause miscalculation by the power prediction model based on cloud ieatures for distributed photovoltaic (PV) plant. The algorithm for decomposing concave cloud into convex images is proposed. Adopting minimum polygonal approximation (MPP) to demonstrate the contour of concave cloud, cloud features are described and the subdivision lines of convex decomposition for the concave clouds are determined by the centroid point scattering model and centroid angle func- tion, which realizes the convex decomposition of concave cloud. The result of MATLAB simulation indicates that the proposed algorithm can accurately detect cloud contour comers and recognize the concave points. The proposed decomposition algorithm has advantages of less time complexity and decomposition part numbers compared to traditional algorithms. So the established model can make the convex decomposition of complex concave clouds completely and quickly, which is available for the existing prediction algorithm for the ultra-short-term power output of distributed PV system based on the cloud features.展开更多
Based on normalized six-hourly black body temperature (TBB) data of three geostationary meteorological satellites,the leading modes of the mei-yu cloud system between 1998 and 2008 were extracted by the Empirical Or...Based on normalized six-hourly black body temperature (TBB) data of three geostationary meteorological satellites,the leading modes of the mei-yu cloud system between 1998 and 2008 were extracted by the Empirical Orthogonal Function (EOF) method,and the transition processes from the first typical leading mode to other leading modes were discussed and compared.The analysis shows that,when the southern mode (EOF1) transforms to the northeastern mode (EOF3),in the mid-troposphere,a low trough develops and moves southeastward over central and eastern China.The circulation pattern is characterized by two highs and one low in the lower troposphere.A belt of low pressure is sandwiched between the weak high over central and western China and the strong western North Pacific subtropical high (WNPSH).Cold air moves southward along the northerly flow behind the low,and meets the warm and moist air between the WNPSH and the forepart of the low trough,which leads to continuous convection.At the same time,the central extent of the WNPSH increases while its ridge extends westward.In addition,transitions from the southern mode to the dual centers mode and the tropical-low-influenced mode were found to be atypical,and so no common points could be concluded.Furthermore,the choice of threshold value can affect the number of samples discussed.展开更多
In order to improve the performance of multi-objective workflow scheduling in cloud system, a multi-swarm multiobjective optimization algorithm(MSMOOA) is proposed to satisfy multiple conflicting objectives. Inspired ...In order to improve the performance of multi-objective workflow scheduling in cloud system, a multi-swarm multiobjective optimization algorithm(MSMOOA) is proposed to satisfy multiple conflicting objectives. Inspired by division of the same species into multiple swarms for different objectives and information sharing among these swarms in nature, each physical machine in the data center is considered a swarm and employs improved multi-objective particle swarm optimization to find out non-dominated solutions with one objective in MSMOOA. The particles in each swarm are divided into two classes and adopt different strategies to evolve cooperatively. One class of particles can communicate with several swarms simultaneously to promote the information sharing among swarms and the other class of particles can only exchange information with the particles located in the same swarm. Furthermore, in order to avoid the influence by the elastic available resources, a manager server is adopted in the cloud data center to collect the available resources for scheduling. The quality of the proposed method with other related approaches is evaluated by using hybrid and parallel workflow applications. The experiment results highlight the better performance of the MSMOOA than that of compared algorithms.展开更多
This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the per...This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large.展开更多
In distributed cloud storage systems, inevitably there exist multiple node failures at the same time. The existing methods of regenerating codes, including minimum storage regenerating(MSR) codes and minimum bandwidth...In distributed cloud storage systems, inevitably there exist multiple node failures at the same time. The existing methods of regenerating codes, including minimum storage regenerating(MSR) codes and minimum bandwidth regenerating(MBR) codes, are mainly to repair one single or several failed nodes, unable to meet the repair need of distributed cloud storage systems. In this paper, we present locally minimum storage regenerating(LMSR) codes to recover multiple failed nodes at the same time. Specifically, the nodes in distributed cloud storage systems are divided into multiple local groups, and in each local group(4, 2) or(5, 3) MSR codes are constructed. Moreover, the grouping method of storage nodes and the repairing process of failed nodes in local groups are studied. Theoretical analysis shows that LMSR codes can achieve the same storage overhead as MSR codes. Furthermore, we verify by means of simulation that, compared with MSR codes, LMSR codes can reduce the repair bandwidth and disk I/O overhead effectively.展开更多
The goal of this project is to use the Semantic Web Technologies and Data Mining for disease diagnosis to assist health care professionals regarding the possible medication and drug to prescribe (Drug recommendation) ...The goal of this project is to use the Semantic Web Technologies and Data Mining for disease diagnosis to assist health care professionals regarding the possible medication and drug to prescribe (Drug recommendation) according to the features of the patient. Numerous Decision Support Systems (DSS) and Expert Systems allow medical collaboration, like in the differential diagnosis specific or general. But, a medical recommendation system using both Semantic Web technologies and Data mining has not yet been developed which initiated this work. However, it should be mentioned that there are several system references about medicine or active ingredient interactions, but their final goal is not the Drug recommendation which uses above technologies. With this project we try to provide an assistant to the doctor for better recommendations. The patient will also able to use this system for explanation of drugs, food interaction and side effects of corresponding drugs.展开更多
With the development of cloud-based data centers and multimedia technologies, cloud-based multimedia service systems have been paid more and more attention. Audio highlights detection plays an important role in the cl...With the development of cloud-based data centers and multimedia technologies, cloud-based multimedia service systems have been paid more and more attention. Audio highlights detection plays an important role in the cloud-based multimedia service system. In this paper, we proposed a novel highlight detection method to extract the audio highlight effects for the cloud-based multimedia service system using the unsupervised approach. In the proposed method, we first extract the audio features for each audio document. Then the spectral clustering scheme was used to decompose the audio document into several audio effects. Then, we introduce the TF-IDF method to label the highlight effect. We design some experiments to evaluate the performance of the proposed method, and the experimental results show that our method can achieve satisfying results.展开更多
In decision support system for spatial site selection, the fuzzy synthetic evaluation is a useful way. However, the method can’t pay attention to the randomness in factors. To remedy the problem, this paper proposes ...In decision support system for spatial site selection, the fuzzy synthetic evaluation is a useful way. However, the method can’t pay attention to the randomness in factors. To remedy the problem, this paper proposes a clouded-base fuzzy approach which combines advantages of cloud transform and fuzzy synthetic evaluation. The cloud transform considers the randomness in the factors and product the higher concept layer for data mining. At the same time, the check mechanism controls the quality of partitions in factors. Then the fuzzy approach was used to get final evaluation value with randomness and fuzziness. It make the final result is optimization. Finally, performance evaluations show that this approach spent less runtime and got more accuracy than the fuzzy synthetic. The experiments prove that the proposed method is faster and more accuracy than the original method.展开更多
In the article, an experiment is aimed at clarifying the transfer efficiency of the database in the cloud infrastructure. The system was added to the control unit, which has guided the database search in the local par...In the article, an experiment is aimed at clarifying the transfer efficiency of the database in the cloud infrastructure. The system was added to the control unit, which has guided the database search in the local part or in the cloud. It is shown that the time data acquisition remains unchanged as a result of modification. Suggestions have been made about the use of the theory of dynamic systems to hybrid cloud database. The present work is aimed at attracting the attention of specialists in the field of cloud database to the apparatus control theory. The experiment presented in this article allows the use of the description of the known methods for solving important practical problems.展开更多
Cloud Computing and in particular cloud services have become widely used in both the technology and business industries. Despite this significant use, very little research or commercial solutions exist that focus on t...Cloud Computing and in particular cloud services have become widely used in both the technology and business industries. Despite this significant use, very little research or commercial solutions exist that focus on the discovery of cloud services. This paper introduces CSRecommender—a search engine and recommender system specifically designed for the discovery of these services. To engineer the system to scale, we also describe the implementation of a Cloud Service Identifier which enables the system to crawl the Internet without human involvement. Finally, we examine the effectiveness and usefulness of the system using real-world use cases and users.展开更多
An e-tag used on the freeway is a kind of passive sensors composed of sensors and radio- frequency identification (RFID) tags. The principle of the electronic toll collection system is that the sensor emits radio wa...An e-tag used on the freeway is a kind of passive sensors composed of sensors and radio- frequency identification (RFID) tags. The principle of the electronic toll collection system is that the sensor emits radio waves touching the e-tag within a certain range, the e-tag will respond to the radio waves by induction, and the sensor will read and write information of the vehicles. Although the RFID technology is popularly used in campus management systems, there is no e-tag technology application used in a campus parking system. In this paper, we use the e-tag technology on a campus parking management system based on the cloud-based construction. By this, it helps to achieve automated and standardized management of the campus parking system, enhance management efficiency, reduce the residence time of the vehicles at the entrances and exits, and improve the efficiency of vehicles parked at the same time.展开更多
This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hac...This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system.展开更多
The pharmaceutical industry’s increasing adoption of cloud-based technologies has introduced new challenges in computerized systems validation (CSV). This paper explores the evolving landscape of cloud validation in ...The pharmaceutical industry’s increasing adoption of cloud-based technologies has introduced new challenges in computerized systems validation (CSV). This paper explores the evolving landscape of cloud validation in pharmaceutical manufacturing, focusing on ensuring data integrity and regulatory compliance in the digital era. We examine the unique characteristics of cloud-based systems and their implications for traditional validation approaches. A comprehensive review of current regulatory frameworks, including FDA and EMA guidelines, provides context for discussing cloud-specific validation challenges. The paper introduces a risk-based approach to cloud CSV, detailing methodologies for assessing and mitigating risks associated with cloud adoption in pharmaceutical environments. Key considerations for maintaining data integrity in cloud systems are analyzed, particularly when applying ALCOA+ principles in distributed computing environments. The article presents strategies for adapting traditional Installation Qualification (IQ), Operational Qualification (OQ), and Performance Qualification (PQ) models to cloud-based systems, highlighting the importance of continuous validation in dynamic cloud environments. The paper also explores emerging trends, including integrating artificial intelligence and edge computing in pharmaceutical manufacturing and their implications for future validation strategies. This research contributes to the evolving body of knowledge on cloud validation in pharmaceuticals by proposing a framework that balances regulatory compliance with the agility offered by cloud technologies. The findings suggest that while cloud adoption presents unique challenges, a well-structured, risk-based approach to validation can ensure the integrity and compliance of cloud-based systems in pharmaceutical manufacturing.展开更多
文摘The increasing trend toward dematerialization and digitalization has prompted a surge in the adoption of IT service providers, offering cost-effective alternatives to traditional local services. Consequently, cloud services have become prevalent across various industries. While these services offer undeniable benefits, they face significant threats, particularly concerning the sensitivity of the data they handle. Many existing mathematical models struggle to accurately depict the complex scenarios of cloud systems. In response to this challenge, this paper proposes a behavioral model for ransomware propagation within such environments. In this model, each component of the environment is defined as an agent responsible for monitoring the propagation of malware. Given the distinct characteristics and criticality of these agents, the impact of malware can vary significantly. Scenario attacks are constructed based on real-world vulnerabilities documented in the Common Vulnerabilities and Exposures (CVEs) through the National Vulnerability Database. Defender actions are guided by an Intrusion Detection System (IDS) guideline. This research aims to provide a comprehensive framework for understanding and addressing ransomware threats in cloud systems. By leveraging an agent- based approach and real-world vulnerability data, our model offers valuable insights into detection and mitigation strategies for safeguarding sensitive cloud-based assets.
基金supported by National Basic Research Program of China(973Program)(2012CB720000)National Natural Science Foundation of China(61225015,61273128)+2 种基金Foundation for Innovative Research Groups of the National Natural Science Foundation of China(61321002)the Ph.D.Programs Foundation of Ministry of Education of China(20111101110012)CAST Foundation(CAST201210)
文摘Cloud computing has become one of the most projecting words in the IT world due to its design for providing computing service as a utility. The typical use of cloud computing as a resource has changed the scenery of computing. Due to the increased flexibility, better reliability, great scalability, and decreased costs have captivated businesses and individuals alike because of the pay-per-use form of the cloud environment. Cloud computing is a completely internet dependent technology where client data are stored and maintained in the data center of a cloud provider like Google, Amazon, Apple Inc., Microsoft etc. The Anomaly Detection System is one of the Intrusion Detection techniques. It’s an area in the cloud environment that is been developed in the detection of unusual activities in the cloud networks. Although, there are a variety of Intrusion Detection techniques available in the cloud environment, this review paper exposes and focuses on different IDS in cloud networks through different categorizations and conducts comparative study on the security measures of Dropbox, Google Drive and iCloud, to illuminate their strength and weakness in terms of security.
文摘The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many different locations and interconnected by high speed networks. CDS, like any other emerging technology, is experiencing growing pains. It is immature, it is fragmented and it lacks standardization. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this paper a comprehensive security framework based on Multi-Agent System (MAS) architecture for CDS to facilitate confidentiality, correctness assurance, availability and integrity of users' data in the cloud is proposed. Our security framework consists of two main layers as agent layer and CDS layer. Our propose MAS architecture includes main five types of agents: Cloud Service Provider Agent (CSPA), Cloud Data Confidentiality Agent (CDConA), Cloud Data Correctness Agent (CDCorA), Cloud Data Availability Agent (CDAA) and Cloud Data Integrity Agent (CDIA). In order to verify our proposed security framework based on MAS architecture, pilot study is conducted using a questionnaire survey. Rasch Methodology is used to analyze the pilot data. Item reliability is found to be poor and a few respondents and items are identified as misfits with distorted measurements. As a result, some problematic questions are revised and some predictably easy questions are excluded from the questionnaire. A prototype of the system is implemented using Java. To simulate the agents, oracle database packages and triggers are used to implement agent functions and oracle jobs are utilized to create agents.
基金Supported by the National High Technology Research and Development Programme of China(No.2013AA050405)Doctoral Fund of Ministry of Education(No.20123317110004)+1 种基金Foundation of Zhejiang Province Key Science and Technology Innovation Team(No.2011R50011)the Natural Science Foundation of Zhejiang Province(No.LY15E070004)
文摘Concave clouds will cause miscalculation by the power prediction model based on cloud ieatures for distributed photovoltaic (PV) plant. The algorithm for decomposing concave cloud into convex images is proposed. Adopting minimum polygonal approximation (MPP) to demonstrate the contour of concave cloud, cloud features are described and the subdivision lines of convex decomposition for the concave clouds are determined by the centroid point scattering model and centroid angle func- tion, which realizes the convex decomposition of concave cloud. The result of MATLAB simulation indicates that the proposed algorithm can accurately detect cloud contour comers and recognize the concave points. The proposed decomposition algorithm has advantages of less time complexity and decomposition part numbers compared to traditional algorithms. So the established model can make the convex decomposition of complex concave clouds completely and quickly, which is available for the existing prediction algorithm for the ultra-short-term power output of distributed PV system based on the cloud features.
基金supported by the National Natural Science Foundation of China (Grant No. 40975023)the Special Promotion Program for Meteorology (Grant No. GYHY201406011 and No. GYHY201106044)the National High Technology Research and Development Project of China (Grant No. 2012AA120903)
文摘Based on normalized six-hourly black body temperature (TBB) data of three geostationary meteorological satellites,the leading modes of the mei-yu cloud system between 1998 and 2008 were extracted by the Empirical Orthogonal Function (EOF) method,and the transition processes from the first typical leading mode to other leading modes were discussed and compared.The analysis shows that,when the southern mode (EOF1) transforms to the northeastern mode (EOF3),in the mid-troposphere,a low trough develops and moves southeastward over central and eastern China.The circulation pattern is characterized by two highs and one low in the lower troposphere.A belt of low pressure is sandwiched between the weak high over central and western China and the strong western North Pacific subtropical high (WNPSH).Cold air moves southward along the northerly flow behind the low,and meets the warm and moist air between the WNPSH and the forepart of the low trough,which leads to continuous convection.At the same time,the central extent of the WNPSH increases while its ridge extends westward.In addition,transitions from the southern mode to the dual centers mode and the tropical-low-influenced mode were found to be atypical,and so no common points could be concluded.Furthermore,the choice of threshold value can affect the number of samples discussed.
基金Project(61473078)supported by the National Natural Science Foundation of ChinaProject(2015-2019)supported by the Program for Changjiang Scholars from the Ministry of Education,China+1 种基金Project(16510711100)supported by International Collaborative Project of the Shanghai Committee of Science and Technology,ChinaProject(KJ2017A418)supported by Anhui University Science Research,China
文摘In order to improve the performance of multi-objective workflow scheduling in cloud system, a multi-swarm multiobjective optimization algorithm(MSMOOA) is proposed to satisfy multiple conflicting objectives. Inspired by division of the same species into multiple swarms for different objectives and information sharing among these swarms in nature, each physical machine in the data center is considered a swarm and employs improved multi-objective particle swarm optimization to find out non-dominated solutions with one objective in MSMOOA. The particles in each swarm are divided into two classes and adopt different strategies to evolve cooperatively. One class of particles can communicate with several swarms simultaneously to promote the information sharing among swarms and the other class of particles can only exchange information with the particles located in the same swarm. Furthermore, in order to avoid the influence by the elastic available resources, a manager server is adopted in the cloud data center to collect the available resources for scheduling. The quality of the proposed method with other related approaches is evaluated by using hybrid and parallel workflow applications. The experiment results highlight the better performance of the MSMOOA than that of compared algorithms.
基金supported by the National Natural Science Foundation of China (61772196 61472136)+3 种基金the Hunan Provincial Focus Social Science Fund (2016ZDB006)Hunan Provincial Social Science Achievement Review Committee results appraisal identification project (Xiang social assessment 2016JD05)Key Project of Hunan Provincial Social Science Achievement Review Committee (XSP 19ZD1005)the financial support provided by the Key Laboratory of Hunan Province for New Retail Virtual Reality Technology (2017TP1026)
文摘This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large.
基金supported in part by the National Natural Science Foundation of China (61640006, 61572188)the Natural Science Foundation of Shaanxi Province, China (2015JM6307, 2016JQ6011)the project of science and technology of Xi’an City (2017088CG/RC051(CADX002))
文摘In distributed cloud storage systems, inevitably there exist multiple node failures at the same time. The existing methods of regenerating codes, including minimum storage regenerating(MSR) codes and minimum bandwidth regenerating(MBR) codes, are mainly to repair one single or several failed nodes, unable to meet the repair need of distributed cloud storage systems. In this paper, we present locally minimum storage regenerating(LMSR) codes to recover multiple failed nodes at the same time. Specifically, the nodes in distributed cloud storage systems are divided into multiple local groups, and in each local group(4, 2) or(5, 3) MSR codes are constructed. Moreover, the grouping method of storage nodes and the repairing process of failed nodes in local groups are studied. Theoretical analysis shows that LMSR codes can achieve the same storage overhead as MSR codes. Furthermore, we verify by means of simulation that, compared with MSR codes, LMSR codes can reduce the repair bandwidth and disk I/O overhead effectively.
文摘The goal of this project is to use the Semantic Web Technologies and Data Mining for disease diagnosis to assist health care professionals regarding the possible medication and drug to prescribe (Drug recommendation) according to the features of the patient. Numerous Decision Support Systems (DSS) and Expert Systems allow medical collaboration, like in the differential diagnosis specific or general. But, a medical recommendation system using both Semantic Web technologies and Data mining has not yet been developed which initiated this work. However, it should be mentioned that there are several system references about medicine or active ingredient interactions, but their final goal is not the Drug recommendation which uses above technologies. With this project we try to provide an assistant to the doctor for better recommendations. The patient will also able to use this system for explanation of drugs, food interaction and side effects of corresponding drugs.
基金supported by National Development and Reform Commission Information Security Special FundNational Key Basic Reseerch Program of China (973 program) under Grant No.2007CB311203
文摘With the development of cloud-based data centers and multimedia technologies, cloud-based multimedia service systems have been paid more and more attention. Audio highlights detection plays an important role in the cloud-based multimedia service system. In this paper, we proposed a novel highlight detection method to extract the audio highlight effects for the cloud-based multimedia service system using the unsupervised approach. In the proposed method, we first extract the audio features for each audio document. Then the spectral clustering scheme was used to decompose the audio document into several audio effects. Then, we introduce the TF-IDF method to label the highlight effect. We design some experiments to evaluate the performance of the proposed method, and the experimental results show that our method can achieve satisfying results.
基金This research is supported by the MIC ( Ministry of Information and Communication) , Korea ,underthe ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Tech-nology Assessment)
文摘In decision support system for spatial site selection, the fuzzy synthetic evaluation is a useful way. However, the method can’t pay attention to the randomness in factors. To remedy the problem, this paper proposes a clouded-base fuzzy approach which combines advantages of cloud transform and fuzzy synthetic evaluation. The cloud transform considers the randomness in the factors and product the higher concept layer for data mining. At the same time, the check mechanism controls the quality of partitions in factors. Then the fuzzy approach was used to get final evaluation value with randomness and fuzziness. It make the final result is optimization. Finally, performance evaluations show that this approach spent less runtime and got more accuracy than the fuzzy synthetic. The experiments prove that the proposed method is faster and more accuracy than the original method.
文摘In the article, an experiment is aimed at clarifying the transfer efficiency of the database in the cloud infrastructure. The system was added to the control unit, which has guided the database search in the local part or in the cloud. It is shown that the time data acquisition remains unchanged as a result of modification. Suggestions have been made about the use of the theory of dynamic systems to hybrid cloud database. The present work is aimed at attracting the attention of specialists in the field of cloud database to the apparatus control theory. The experiment presented in this article allows the use of the description of the known methods for solving important practical problems.
文摘Cloud Computing and in particular cloud services have become widely used in both the technology and business industries. Despite this significant use, very little research or commercial solutions exist that focus on the discovery of cloud services. This paper introduces CSRecommender—a search engine and recommender system specifically designed for the discovery of these services. To engineer the system to scale, we also describe the implementation of a Cloud Service Identifier which enables the system to crawl the Internet without human involvement. Finally, we examine the effectiveness and usefulness of the system using real-world use cases and users.
文摘An e-tag used on the freeway is a kind of passive sensors composed of sensors and radio- frequency identification (RFID) tags. The principle of the electronic toll collection system is that the sensor emits radio waves touching the e-tag within a certain range, the e-tag will respond to the radio waves by induction, and the sensor will read and write information of the vehicles. Although the RFID technology is popularly used in campus management systems, there is no e-tag technology application used in a campus parking system. In this paper, we use the e-tag technology on a campus parking management system based on the cloud-based construction. By this, it helps to achieve automated and standardized management of the campus parking system, enhance management efficiency, reduce the residence time of the vehicles at the entrances and exits, and improve the efficiency of vehicles parked at the same time.
文摘This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system.
文摘The pharmaceutical industry’s increasing adoption of cloud-based technologies has introduced new challenges in computerized systems validation (CSV). This paper explores the evolving landscape of cloud validation in pharmaceutical manufacturing, focusing on ensuring data integrity and regulatory compliance in the digital era. We examine the unique characteristics of cloud-based systems and their implications for traditional validation approaches. A comprehensive review of current regulatory frameworks, including FDA and EMA guidelines, provides context for discussing cloud-specific validation challenges. The paper introduces a risk-based approach to cloud CSV, detailing methodologies for assessing and mitigating risks associated with cloud adoption in pharmaceutical environments. Key considerations for maintaining data integrity in cloud systems are analyzed, particularly when applying ALCOA+ principles in distributed computing environments. The article presents strategies for adapting traditional Installation Qualification (IQ), Operational Qualification (OQ), and Performance Qualification (PQ) models to cloud-based systems, highlighting the importance of continuous validation in dynamic cloud environments. The paper also explores emerging trends, including integrating artificial intelligence and edge computing in pharmaceutical manufacturing and their implications for future validation strategies. This research contributes to the evolving body of knowledge on cloud validation in pharmaceuticals by proposing a framework that balances regulatory compliance with the agility offered by cloud technologies. The findings suggest that while cloud adoption presents unique challenges, a well-structured, risk-based approach to validation can ensure the integrity and compliance of cloud-based systems in pharmaceutical manufacturing.